Login / Signup
Quantum identity authentication based on ping-pong technique without entanglements.
Hao Yuan
Yi-min Liu
Guo-zhu Pan
Gang Zhang
Jun Zhou
Zhan-jun Zhang
Published in:
Quantum Inf. Process. (2014)
Keyphrases
</>
identity authentication
ping pong
mobile commerce
macro operators
data protection
network security
databases
database systems
mobile devices
wireless sensor networks