首页
期刊导航
期刊检索
论文检索
新闻中心
期刊
期刊
论文
首页
>
《通讯和计算机:中英文版》
>
2005年11期
>
BB84 Protocol and Its Security Analysis
BB84 Protocol and Its Security Analysis
打印
分享
在线阅读
下载PDF
导出详情
摘要
未填写
DOI
7j6vr61pd0/477518
作者
Jie Yang Tian Yang
机构地区
不详
出处
《通讯和计算机:中英文版》
2005年11期
关键词
分类
[自动化与计算机技术][计算机应用技术]
出版日期
2005年11月21日(中国期刊网平台首次上网日期,不代表论文的发表时间)
相关文献
1
DAI Guang-ming;WANG Mao-cai;HU Han-ping.
Security analysis on WEP protocol
.计算机应用技术,2008-02.
2
LiZehui;LiuYong;SunJin.
Discussion on data-security of space-earth integrated network and analysis of space communications protocol standards
.物理电子学,2005-02.
3
YANG Fan PU Fang CAO Qi-ying LI Tong.
SPEP: Security Protocol to Enhance Privacy in Pervasive Computing
.计算机应用技术,2007-01.
4
M. Indra Sena Reddy K. Subba Reddy P. J. Bhatt Rajeev Chetwani.
Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
.物理电子学,2012-03.
5
AN Peng;LI Sheng-hong.
Empirical analysis on risk of security investment
.基础数学,2009-02.
6
Bao Haijun.
Analysis on mechanism of land resource security
.政治经济学,2008-02.
7
CHEN Wen-yue;CUI Hai-rui;BAO Jin-song;ZHOU Xiang-sheng;SHU Qing-yao.
A Simplified Rice DNA Extraction Protocol for PCR Analysis
.作物学,2006-01.
8
WANG DICHE.
An Analysis of the Riaht to Social Security for Disabled Persons
.中外政治制度,2012-06.
9
CuiGuangliang FengZhengjin HuoGuojie.
Security analysis and modification of a chaotic encryption system
.物理电子学,2004-04.
10
Marn-Ling Shing;Chen-Chi Shing;Lee-Pin Shing.
Analysis of a Two Category Confidentiality Modeling Information Security
.计算机应用技术,2012-05.
来源期刊
通讯和计算机:中英文版
2005年11期
相关推荐
The Quantitative Analysis on Leverage and its Effects
Changes in China's Energy Situation and Its Strategy for Energy Security
Building a Community of Common Security: China's Approach to Its Neighborhood
Analysis of China's Water Security and Virtual Water Trade
Security analysis of two recently proposed RFID authentication protocols
同分类资源
更多
[计算机应用技术]
人间大炮——SP-800UZ 奥林巴斯30倍超长变焦数码相机
[计算机应用技术]
追魂四式:asp木马无处可逃
[计算机应用技术]
惠普(HP)/Compaq Presario X1000
[计算机应用技术]
Outlook2010和OneNote2010集成(1):电子邮件
[计算机应用技术]
数据中心:资本左右的市场?
相关关键词
返回顶部