Login / Signup
An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT.
Hongyang Ma
Bingquan Chen
Published in:
Wirel. Pers. Commun. (2016)
Keyphrases
</>
authentication protocol
similarity measure
key distribution
security issues
security protocols