Login / Signup
Trojan Horse Attack Strategy on Quantum Private Communication.
Jinye Peng
GuangQiang He
Jin Xiong
Guihua Zeng
Published in:
ISPEC (2006)
Keyphrases
</>
communication patterns
communication overhead
information exchange
countermeasures
lightweight
communication networks
quantum computation
real time
quantum computing
quantum mechanics
multi party
selection strategy
communication systems
communication cost
search strategy
privacy preserving
neural network