000 | 03177nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-981-15-3386-0 | ||
003 | DE-He213 | ||
005 | 20220801215417.0 | ||
007 | cr nn 008mamaa | ||
008 | 200229s2020 si | s |||| 0|eng d | ||
020 |
_a9789811533860 _9978-981-15-3386-0 |
||
024 | 7 |
_a10.1007/978-981-15-3386-0 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aShang, Tao. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _944197 |
|
245 | 1 | 0 |
_aSecure Quantum Network Coding Theory _h[electronic resource] / _cby Tao Shang, Jianwei Liu. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aXVI, 283 p. 79 illus., 1 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Preliminaries -- Typical quantum network coding schemes -- Quantum network coding based on repeaters -- Quantum network coding based on controllers -- Opportunistic quantum network coding -- Quantum network coding with authentication -- Quantum network coding for continuous variables -- Security analysis of quantum cryptographic protocols -- Security analysis based on BAN logic -- Security analysis based on quantum random oracle model -- Security analysis of quantum obfuscation -- Security analysis of measurement-device independency. | |
520 | _aThis is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the book subsequently provides a series of quantum network coding schemes based on the integration of quantum cryptography into quantum communication. Furthermore, it describes the general security analysis method for quantum cryptographic protocols. Accordingly, the book equips readers with effective tools for researching and applying quantum network coding. . | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aSpintronics. _96964 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aSpintronics. _96964 |
650 | 2 | 4 |
_aCoding and Information Theory. _944198 |
700 | 1 |
_aLiu, Jianwei. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _944199 |
|
710 | 2 |
_aSpringerLink (Online service) _944200 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811533853 |
776 | 0 | 8 |
_iPrinted edition: _z9789811533877 |
776 | 0 | 8 |
_iPrinted edition: _z9789811533884 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-15-3386-0 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c77460 _d77460 |