Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Key Distribution: from Principles to Practicalities., and . Appl. Algebra Eng. Commun. Comput., 10 (4/5): 383-399 (2000)Secret keys from quantum correlations.. Inform. Forsch. Entwickl., 21 (1-2): 29-37 (2006)Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography., , , and . Quantum Inf. Comput., 7 (7): 639-664 (2007)Using quantum key distribution for cryptographic purposes: A survey., , , , , , , , , and 13 other author(s). Theor. Comput. Sci., (2014)Squashing model for detectors and applications to quantum key distribution protocols., , , , , and . CoRR, (2013)Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states., , , and . Quantum Inf. Comput., 7 (7): 665-688 (2007)Updating Quantum Cryptography Report ver. 1., , , , , , , , , and 17 other author(s). CoRR, (2009)Theory of Quantum Key Distribution: The Road Ahead (Invited Talk).. ICITS, volume 5155 of Lecture Notes in Computer Science, page 120. Springer, (2008)Quantum key distribution and cryptography: a survey., , , , , , , , , and 14 other author(s). Classical and Quantum Information Assurance Foundations and Practice, volume 09311 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)Worldwide standardization activity for quantum key distribution., , , , , , , , , and 1 other author(s). GLOBECOM Workshops, page 656-661. IEEE, (2014)