[1] |
ZHOU N R , CHENG H L , et al. Three-party quantum network com-munication protocols based on quantum teleportation[J]. International Journal of Theoretical Physics, 2014,23(4):1387-1403.
|
[2] |
曾贵华 . 特洛依木马攻击下的量子密码安全性(英文)[J]. 软件学报, 2004,19(8):1259-1264. ZENG G H . Security of quantum cryptography against Trojan horse attacking[J]. Journal of Software, 2004,19(8):1259-1264.
|
[3] |
GONG L H , LIU Y , ZHOU N R . Novel quantum virtual private net-work scheme for PON via quantum secure direct communication[J]. International Journal of Theoretical Physics, 2013,52(9):3260-3268.
|
[4] |
MA H Y , CHEN B Q , et al. Development of quantum network based on multiparty quantum secret sharing[J]. Canadian Journal of Physics, 2008,86(9):1097-1101.
|
[5] |
刘焕淋, 岁蒙, 邓朗 . 基于多核点共享树的多源光多播路由方法[J]. 光子学报, 2014,43(2):0127001. LIU H L , SUI M , DENG L . A method of multi-source optical multi-cast routing based on multi-core node shared trees[J]. Acta Photonica Sinica, 2014,43(2):0127001.
|
[6] |
孙雁鸣, 马恒太, 郑刚 等. 卫星多播多组共享密钥管理方案[J]. 宇航学报, 2013,34(6):824-832. SUN Y M , MA H T , ZHENG G , et al. Multiple group shared key management for satellite multicast[J]. Journal of Astronautics, 2013,34(6):824-832.
|
[7] |
CHEN Y S , LIN Y W . Mobicast routing protocol for underwater sen-sor networks[J]. IEEE Sensors Journal, 2013,13(2):737-1403.
|
[8] |
肖春静, 刘明, 龚海刚 等. 无线Mesh网络低干扰多播[J]. 软件学报, 2013,24(6):1295-1309. XIAO C J , LIU M , GONG H G , et al. Low-interference multicast in wire-less mesh networks[J]. Journal of Software, 2013,24(6):1295-1309.
|
[9] |
周小清, 邬云文, 赵晗 . 量子隐形传态网络的广播与多播[J]. 物理学报, 2012,61(17):22-27. ZHOU X Q , WU Y W , ZHAO H . Broadcast and multicast in quantum teleportation internet[J]. Acta Physica Sinica, 2012,61(17):22-27.
|
[10] |
JONATHAN D , PLENIO M B , VEDRAL V , et al. Quantum hacking on quantum key distribution using homodyne detection[J]. Physical Review A, 2014,89(3):032304.
|
[11] |
刘晓慧, 聂敏, 裴昌幸 . 量子无线广域网构建与路由策略[J]. 物理学报, 2013,62(20):200304. LIU X H , NIE M , PEI C X . Quantum wireless wide-area networks and routing strategy[J]. Acta Physica Sinica, 2013,62(20):200304.
|
[12] |
GHIU I . Asymmetric quantum telecloning of d-level systems and broadcasting of entanglement to different locations using the“many-to-many” communication protocol[J]. Physical Review A, 2003,67(1):012323.
|
[13] |
李超, 聂敏 . 基于特洛伊木马攻击的多用户树型量子信令损伤模型及修复策略[J]. 光子学报, 2012,40(10):1256-1260. LIU C , NIE M . Damage model of quantum signaling of multi-user based on malicious attack and repair strategy[J]. Acta Photonica Sinica, 2012,40(10):1256-1260.
|
[14] |
YUAN Z S , BAO X H , LUA C Y , et al. Entangled photons and quan-tum communication[J]. Physics Reports, 2010,497(1):1-40.
|
[15] |
EKERT A K . Quantum cryptography based on Bell's theorem[J]. Physical Review Letters, 1991,67(6):661-663.
|