Login / Signup

An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT.

Hongyang MaBingquan Chen
Published in: Wirel. Pers. Commun. (2016)
Keyphrases
  • authentication protocol
  • similarity measure
  • key distribution
  • security issues
  • security protocols