Login / Signup
A Remote Security Computational Ghost Imaging Method Based on Quantum Key Distribution Technology.
Jianan Wu
Yun Chen
Cheng Zhou
Zhongyang Chen
Chengqian Xu
Lijun Song
Published in:
IEEE Access (2022)
Keyphrases
</>
cost effective
key management
digital libraries
network security
security policies