共 50 条
- [41] Security of ping-pong protocol based on pairs of completely entangled qudits Quantum Information Processing, 2012, 11 : 1419 - 1430
- [43] Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)] Quantum Information Processing, 2011, 10 : 317 - 323
- [44] Sizzling chops and devilish spins - Ping-pong and the art of staying alive NEW YORK TIMES BOOK REVIEW, 2002, : 23 - 23
- [46] Secure direct communication based on ping–pong protocol Quantum Information Processing, 2009, 8 : 347 - 356
- [47] Quantum identity authentication based on ping-pong technique without entanglements Quantum Information Processing, 2014, 13 : 2535 - 2549
- [48] An Improved Security Detection Strategy Based on W State in "Ping-pong" Protocol CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (01): : 117 - 120
- [49] An improved security detection strategy based on w state in ping-pong protocol Li, J. (lijian@bupt.edu.cn), 1600, Chinese Institute of Electronics (21):
- [50] Improved Quantum “Ping-Pong” Protocol Based on Five-Qubit GHZ State and Classical CNOT Operation International Journal of Theoretical Physics, 2012, 51 : 292 - 302