Conference paper
Identity delegation in policy based systems
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
We review the goals of cryptography, explain how quantum laws allow some of these goals to be attained that could not be otherwise, and comment on the future of quantum cryptography and the nature of its security.
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
B.K. Boguraev, Mary S. Neff
HICSS 2000
Elliot Linzer, M. Vetterli
Computing
Matthias Kaiserswerth
IEEE/ACM Transactions on Networking