Login / Signup

Quantum identity authentication based on ping-pong technique without entanglements.

Hao YuanYi-min LiuGuo-zhu PanGang ZhangJun ZhouZhan-jun Zhang
Published in: Quantum Inf. Process. (2014)
Keyphrases
  • identity authentication
  • ping pong
  • mobile commerce
  • macro operators
  • data protection
  • network security
  • databases
  • database systems
  • mobile devices
  • wireless sensor networks