2018
DOI: 10.1007/s11128-018-2091-7
|View full text |Cite
|
Sign up to set email alerts
|

Improving the security of quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 47 publications
0
14
0
Order By: Relevance
“…Teaching content analysis is to determine the main knowledge points to be taught, clarify the key content and difficulties and consider the interrelations between knowledge points, so as to allow students to establish their own knowledge structure system and master basic knowledge and professional skills [9].…”
Section: Fig 6 Main Components Of Front-end Analysismentioning
confidence: 99%
“…Teaching content analysis is to determine the main knowledge points to be taught, clarify the key content and difficulties and consider the interrelations between knowledge points, so as to allow students to establish their own knowledge structure system and master basic knowledge and professional skills [9].…”
Section: Fig 6 Main Components Of Front-end Analysismentioning
confidence: 99%
“…Different types of evaluation indicators were acquired and standardized to ensure a uniform dimension, and the value was between 0-1. In order to clarify the assessment levels of art teaching reform capacity, this paper applies the gray system theory [20][21] to perform gray cluster analysis of art teaching reform capacity [22][23][24][25], and classifies the evaluation indicators into 5 levels in terms of gray class: LV1 (excellent), LV2 (good), LV3 (medium), LV4 (general), and LV5 (poor).…”
Section: Evaluation Process For Teaching Reform Capacity Of Art Courses Based On Grey Cluster Analysismentioning
confidence: 99%
“…2). Similar strategies of collusion attack have been investigated and addressed in [33], [34], and [77]- [79]. In Liu-Wang's protocol, the S q TP sequence prepared by TP is transmitted among n parties (P 1 , P 2 , .…”
Section: Insecrity Of Liu-wang's Protocolmentioning
confidence: 99%