يعرض 1 - 20 نتائج من 238 نتيجة بحث عن '"子图"', وقت الاستعلام: 0.54s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal
  3. 3
    Report
  4. 4
    Academic Journal
  5. 5
    Academic Journal
  6. 6
    Academic Journal
  7. 7
  8. 8
    Dissertation/ Thesis

    المؤلفون: 曾基臺, Tseng, Chi-Tai

    المساهمون: 左瑞麟, Tso, Ray-lin

    وصف الملف: 2039578 bytes; application/pdf

    Relation: [1] "Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE (1984)." [2] H.-K. Lo and H. F. Chau, "Unconditional Security of Quantum Key Distribution Over Arbitrarily Long Distances," Science (American Association for the Advancement of Science), vol. 283, no. 5410, pp. 2050-2056, 1999, doi:10.1126/science.283.5410.2050. [3] P. W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Physical review letters, vol. 85, no. 2, pp. 441-444, 2000, doi:10.1103/PhysRevLett.85.441. [4] D. Mayers, "Unconditional security in quantum cryptography," Journal of the ACM, vol. 48, no. 3, pp. 351-406, 2001, doi:10.1145/382780.382781. [5] E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, "A proof of the security of quantum key distribution," Journal of cryptology, vol. 19, no. 4, pp. 381-439, 2006, doi:10.1007/s00145-005-0011-3. [6] G. Long and X. Liu, "Theoretically efficient high-capacity quantum-key- distribution scheme," Phys. Rev. A, vol. 65, 2002// 2002, doi:10.1103/PhysRevA.65.032302. [7] F. Deng, G. Long, and X. Liu, "Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block," Phys. Rev. A, vol. 68, 2003// 2003, doi:10.1103/PhysRevA.68.042317. [8] F. Deng and G. Long, "Secure direct communication with a quantum one-time pad," Phys. Rev. A, vol. 69, 2004// 2004, doi:10.1103/PhysRevA.69.052319. [9] X. Jin, X. Ji, and Y. Zhang, "Three-party quantum secure direct communication based on GHZ states," Phys. Lett. A, vol. 354, 2006// 2006, doi:10.1016/j.physleta.2006.01.035. [10] M. Wang and F. Yan, "Three-party simultaneous quantum secure direct communication scheme with EPR pairs," Chin. Phys. Lett., vol. 24, 2007// 2007, doi:10.1088/0256-307X/24/9/007. [11] Y. Xia and Z. Man, "Controlled quantum N-party simultaneous direct communication," Commun. Theor. Phys., vol. 48, 2007// 2007, doi:10.1088/0253-6102/48/1/017. [12] S. Chong and T. Hwang, "The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs," Opt. Commun., vol. 284, 2011// 2011, doi:10.1016/j.optcom.2010.08.037. [13] Y. He and W. Ma, "Three-party quantum secure direct communication against collective noise," Quantum Inf. Process., vol. 16, 2017// 2017, doi:10.1007/s11128-017-1703-y. [14] S. S. Chen, L. Zhou, W. Zhong, and Y. B. Sheng, "Three-step three-party quantum secure direct communication," Sci. China Phys. Mech. Astron., vol. 61, 2018// 2018, doi:10.1007/s11433-018-9224-5. [15] M. Boyer, R. Gelles, and D. Kenigsberg, "Semiquantum key distribution," Phys. Rev. A, vol. 79, 2009// 2009, doi:10.1103/PhysRevA.79.032341. [16] W. e. i. Zhang, D. a. o. w. e. n. Qiu, and P. a. u. l. o. Mateus, "Security of a single-state semi-quantum key distribution protocol," Quantum Inf. Process., vol. 17, 2018// 2018, doi:10.1007/s11128-018-1904-z. [17] X. Zou and D. Qiu, "Three-step semiquantum secure direct communication protocol," Sci. China Phys. Mech. Astron., vol. 57, 2014// 2014, doi:10.1007/s11433-014-5542-x. [18] C. Xie, L. Li, and H. Situ, "Semi-quantum secure direct communication scheme based on bell states," Int. J. Theor. Phys., vol. 57, 2018// 2018, doi:10.1007/s10773-018-3713-7. [19] C. Yang and C. Tsai, "Advanced semi-quantum secure direct communication protocol based on bell states against flip attack," Quantum Inf. Process., vol. 19, 2020// 2020, doi:10.1007/s11128-020-02623-7. [20] M. Zhang, H. Li, and Z. Xia, "Semiquantum secure direct communication using EPR pairs," Quantum Inf. Process., vol. 16, 2017// 2017, doi:10.1007/s11128-017-1573-3. [21] W. Krawec, "Mediated semiquantum key distribution," Phys. Rev. A, vol. 91, 2015// 2015, doi:10.1103/PhysRevA.91.032323. [22] Z. Rong, D. Qiu, P. Mateus, and X. Zou, "Mediated semi-quantum secure direct communication," Quantum information processing, vol. 20, no. 2, 2021, doi:10.1007/s11128-020-02965-2. [23] M. Hein, J. Eisert, and H. J. Briegel, "Multiparty entanglement in graph states," Physical review. A, Atomic, molecular, and optical physics, vol. 69, no. 6, pp. 1-62311, 2004, doi:10.1103/PhysRevA.69.062311. [24] M. Nielsen and I. Chuang, Quantum Computation and Quantum Information. Cambridge University Press: Cambridge, 2000. [25] N. Ananth and M. Senthilvelan, "Identifying non-k-separability of a class of N-qubit complete graph states using correlation tensors," The European physical journal. D, Atomic, molecular, and optical physics, vol. 70, no. 7, 2016, doi:10.1140/epjd/e2016-70056-2. [26] D. Pan et al., "The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet," IEEE Communications Surveys & Tutorials, pp. 1- 1, 2024, doi:10.1109/COMST.2024.3367535. [27] A. Farouk, M. Zakaria, A. Megahed, and F. A. Omara, "A generalized architecture of quantum secure direct communication for N disjointed users with authentication," Sci. Rep., vol. 5, 2015// 2015, doi:10.1038/srep16080. [28] C. h. e. n. Xie, L. v. z. h. o. u. Li, H. a. o. z. h. e. n. Situ, and J. i. a. n. h. a. o. He, "Semi-quantum secure direct communication scheme based on Bell states," Int. J. Theor. Phys., vol. 57, 2018// 2018, doi:10.1007/s10773-018- 3713-7. [29] Z. Rong, D. Qiu, and X. Zou, "Semi-quantum secure direct communication with entanglement," Int. J. Theor. Phys., vol. 59, 2020// 2020, doi:10.1007/s10773-020-04447-8. [30] M. Boyer, D. Kenigsberg, and T. Mor, "Quantum key distribution with classical bob," Phys. Rev. Lett., vol. 99, 2007// 2007, doi:10.1103/PhysRevLett.99.140501. [31] M. Z. A. Bhuiyan and J. Wu, "Collusion Attack Detection in Networked Systems," in 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 8-12 Aug. 2016 2016, pp. 286-293, doi:10.1109/DASC-PICom-DataCom- CyberSciTec.2016.67. [32] Q. Y. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Phys. Lett. A, vol. 351, 2006// 2006, doi:10.1016/j.physleta.2005.10.050. [33] F. G. Deng, X. H. Li, H. Y. Zhou, and Z. J. Zhang, "Improving the security of multiparty quantum secret sharing against Trojan horse attack," Physical review. A, Atomic, molecular, and optical physics, vol. 72, no. 4, 2005, doi:10.1103/PhysRevA.72.044302. [34] A. Cabello, "Quantum key distribution in the Holevo limit," Phys. Rev. Lett., vol. 85, 2000// 2000, doi:10.1103/PhysRevLett.85.5635. [35] C. W. Yang and T. Hwang, "Efficient key construction on semi-quantum secret sharing protocols," Int. J. Quantum Info., vol. 11, 2013// 2013, doi:10.1142/S0219749913500524. [36] C. W. Yang and T. Hwang, "Trojan horse attack free fault-tolerant quantum key distribution protocols," Quantum Inf. Process., vol. 13, 2014// 2014, doi:10.1007/s11128-013-0689-3. [37] Y. F. Yang, L. Z. Duan, T. R. Qiu, X. M. Xie, and W. Y. Duan, "Multi-party semi-quantum secure direct communication using Greenberger–Horne– Zeilinger states," Quant. Inform. Process., vol. 21, 2022// 2022, doi:10.1007/s11128-022-03671-x. [38] L.-C. Xu, H.-Y. Chen, N.-R. Zhou, and L.-H. Gong, "Multi-party semi- quantum secure direct communication protocol with cluster states," International journal of theoretical physics, vol. 59, no. 7, pp. 2175-2186, 2020, doi:10.1007/s10773-020-04491-4.; G0109971027; https://nccur.lib.nccu.edu.tw//handle/140.119/152766; https://nccur.lib.nccu.edu.tw/bitstream/140.119/152766/1/102701.pdf

  9. 9
    Academic Journal

    المصدر: Zhejiang Daxue xuebao. Lixue ban, Vol 29, Iss 6, Pp 607-609 (2002)

    وصف الملف: electronic resource

  10. 10
    Conference
  11. 11
    Report
  12. 12
    Academic Journal
  13. 13
    Academic Journal
  14. 14
    Academic Journal
  15. 15
    Academic Journal
  16. 16
    Report
  17. 17
    Report
  18. 18
    Academic Journal
  19. 19
    Conference

    المساهمون: 北京大学湍流与复杂系统国家重点实验室, 弗吉利亚州立大学力学与核工程系

    المصدر: 知网

    Relation: 第八届全国高超声速科技学术会议.中国黑龙江哈尔滨.; 1412219; http://hdl.handle.net/20.500.11897/446110

  20. 20
    Report