원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.3 No.4
2009.10
pp.45-67
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Previous work
3. Motivation
4. Random ? phase shift protocol
4.1 Opaque eavesdropping
4.2 Translucent eavesdropping
5. QKD scheme based on the Fourier transform
5.1 An Example
6. Simulations
7. Conclusions
References
1. Introduction
2. Previous work
3. Motivation
4. Random ? phase shift protocol
4.1 Opaque eavesdropping
4.2 Translucent eavesdropping
5. QKD scheme based on the Fourier transform
5.1 An Example
6. Simulations
7. Conclusions
References
키워드
저자정보
참고문헌
자료제공 : 네이버학술정보
