|
Bibliography [1]C. Y. Lu, T. Yang, and J. W. Pan, S. Mancini, “Experimental multiparticle entanglement swapping for quantum networking,” Phys. Rev. Lett. 103, 020501 (2009). [2]S. Broadfoot, U. Domer, and D. Jaksch, ”Singlet generation in mixed-state quantum networks,” Phys. Rev. A 81, 042316 (2009). [3]M. Aspelmeyer, T. Jennewein, M. Pfennigbauer, W. R. Leeb, A. Zeilinger, ”Long-distance quantum communication with entangled photons using satellites,” IEEE Journal of Quantum Electronics, vol. 9, no. 6, pp. 1541-1551, Nov-Dec 2003. [4]S. T. Cheng, C. Y. Wang, and M. H. Tao," Quantum communication for Wireless Wide-Area Networks," IEEE JASC, vol. 23, no. 7, pp. 1424-1432, July 2005. [5]Z. J. Zhang, Z. X. Man, “Multiparty quantum secret sharing of classical messages based on entanglement swapping,” Phys. Rev. A 72, 022303 (2005). [6]C. H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peres, and W. K. Wootters,“ Teleporting an unknown quantum state via dual classic and EPR channels,” Phys. Rev. Lett. 70, 1895 (1993). [7]Z. Zhang, Y Li and Z Man, ”Multiparty quantum secret sharing,” Phys. Rev. A 71, 044301(2005). [8]F. G. Deng and G. L. Long, "Secure Direct Communication with a Quantum One-time Pad," Phys. Rev. A 69, 052319 (2004). [9]T. Hwang and K.C. Lee, 2007, "EPR Quantum Key Distribution Protocols with 100% Qubit Efficiency", IET Information Security, vol. 1, no. 1, pp. 43-45, Mar. 2007. [10]Y. S. Zhang, C. F. Li and G. C. Guo, ”Quantum authentication using entangled state,” ArXive e-print quant-ph /0008044, 2000. [11]Y. Kanamori, S. M. Yoo, D. A. Gregory and F. T. Sheldon, ”On Quantum authentication protocols,” Proc. of the IEEE GLOBECOM, pp. 1650-1654, 2005. [12]T. S. Lin, I. M. Tsai, and S. Y. Kuo, “Quantum position key distribution protocol using entangled state,” International journal of quantum information, submitted for publication 2010. [13]G. L. Long and X. S. Liu, “Theoretically efficient high-capacity quantum-key-distribution protocol, ” Phys. Rev. Lett. 85, 032302 (2002). [14]J. Wang, Q. Zhang, and C. J. Tang, "Quantum key distributions using entangled state," in Proc. IEEE International Conference on Computational Intelligence and Security, pp. 1355-1358, 2006. [15]H Lee, J Lim, and H.J. Yang,”Quantum direct communication with authentication”, Phys. Rev. A 73, 024305 (2006). [16]Z. J. Zhang, J Liu, D. Wang, and S.H. Shi, ”Comment on “quantum direct communication with authentication,” Phys. Rev. A 75, 026301 (2007). [17]J. Oppenheim, and M. Horodecki, ” How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information,” Phys. Rev. A 72, 042309 (2005). [18]G. Zeng, and C. K. Keitel, “Arbitrated quantum-signature scheme,” Phys. Rev. A, 65, 042312 (2002). [19]D. Gottesman, and I. Chuang, “Quantum Digital Signatures,” e-print quant-ph/0105032. [20]H. Lee, C. Hong, H. Kim, J. Lim, and H. J. Yang, “Arbitrated quantum-signature scheme with message recovery,” Physics Letter A, 321, 295 (2004). [21]J. Wang, Q. Zhang, and C. J. Tang, “Quantum Signature scheme with single photons,” e-print quant-ph/0511224. [22]Y. R. Tsai, and S. J. Wang, “Routing Security in Wireless Ad hoc Networks,” IEEE Communications Magazine, vol 40, no. 10, pp. 70-75, Oct. 2002. [23]Y.R. Tsai; and S.J. Wang, ”Routing security and authentication mechanism for mobile ad hoc networks,” IEEE Conference on Vehicular Technology, vol.7, pp. 4716-4720, Sep. 2004. [24]K.S. Ng, and K.G. Seah, ”Routing security and data confidentiality for mobile ad hoc networks,” IEEE Conference on Vehicular Technology, vol. 3, pp. 1821-1825, 2003. [25]K.S. Ng, and K.G. Seah, ”Routing security and transmission confidentiality for mobile ad hoc networks,” IEEE Vehicular Technology, vol. 3, pp.1821-1825, 2003. [26]S. Bouam, and B.O. Jalel, “Data security in ad hoc networks using multipath routing,” Proc. of the IEEE PIMRC, vol. 2, pp. 1331-1335, 2003 [27]V. Berman, and B. Mukherjee, ”Data security in MANETs using multipath routing directional transmission,” IEEE Communications Magazine, vol. 5, pp. 2322 – 2328, June 2006. [28]G. Folland and A. Sitaram. The uncertainty principle: A mathematical survey, Journal of Fourier Analysis and Applications, pp. 207-238, 1997. [29]H. Yang, F. Ricciato, S. Lu, and L. Zhang, ”Securing a wireless world,” Proceedings of the IEEE, vol. 94, no. 2, pp. 442–454, Feb. 2006. [30]P. Shor,”Algorithms for quantum computation: discrete logarithms and factoring,” Proc. of the 35th Annual IEEE Symposium on the Foundations of Computer Science, pp. 124-134, 1994. [31]M. Hillery, V. Buzk, and A. Berthiaume, ”Quantum secret sharing,” Phys. Rev. A 59, 1829 (1999). [32]Y. L. Sun, W. Yu, Z. Han, and K.J.R. Liu, “Information theoretic framework of trust modeling and evaluation for ad hoc networks,” IEEE Journal of Selected Areas in Communication, vol. 24, no. 2, pp. 305 – 316, Feb 2006. [33]T. Hwang and K.C. Lee, 2007, "EPR Quantum Key Distribution Protocols with 100% Qubit Efficiency", IET Information Security, vol. 1, no. 1, pp. 43-45, 2007. [34]T. S. Lin, I. M. Tsai, and S. Y. Kuo, ”Quantum transmission integrity mechanism based on quantum reversible switching circuits,” IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences, Submitted 2009. [35]J. Gruska, Quantum Computing, Masaryk UK, McGraw-Hill Pulishing Company, 1999. [36]H. W. Wang, T. S. Lin, I. M. Tsai, and S. Y. Kuo," Protocol and Applications for Sharing Quantum Private keys," Proc. of the 39th IEEE International Carnahan Conference on Security Technology, pp. 204-207, 2005. [37]Y. Li, K. Zhang, and K Pen, ”Multiparty secret sharing of quantum information based on entanglement swapping,” Phys. Letter A, 324, 420 (2004). [38]W.K. Wootters and W.H. Zurek, ”A single quantum cannot be cloned,” Nature, 299, 802 (1992). [39]C.H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing", in Proc. IEEE International Conference on Computers Systems and Signal Processing, Bangalore India, December 1984, pp 175-179. [40]N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys., vol. 74, pp. 145–195, Jan. 2002. [41]P.W. Shor, and J. Preskill, ”Simple proof of security of the BB84 quantum key distribution protocol”, Phys. Rev. Lett. 85, 441 (2000). [42]A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 85, 661 (1991). [43]C. Bennett, ”Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett. 85, 3121 (1992). [44]Y.C. Hu, and A. Perrig, ”Ariadne: a secure on-demand routing protocol for ad hoc networks,” Wireless Networks, vol. 11, pp. 21-38, 2005. [45]Q.H. Hussein, T.N. Saadawi, and M.J. Lee, “Probability routing algorithm for ad hoc networks’ resource management,” IEEE JASC, vol. 23, no. 12, pp. 2248– 2259, Dec 2005. [46]T. S. Lin, and S. Y. Kuo, ”Quantum wireless secure communication protocol,” Proc. of the 41t IEEE International Carnahan Conference on Security Technology, pp. 146-155, 2007. [47]M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information. New York: Cambridge Univ. Press, 2000.. [48]K. Inoue, ”Quantum key distribution technologies,” IEEE Journal of Quantum Electronics, vol. 12, no. 4, pp. 888–896, July-Aug. 2006. [49]M. Gabay, and S. Arnon, ”Quantum key distribution by a free-space MIMO system,” IEEE Journal of Lightwave Technology, vol. 24, no. 8, pp. 3114-3120, Aug. 2006. [50]T. S. Lin, I. M. Tsai, and S. Y. Kuo,” Quantum wireless intrusion detection mechanism,” Second Workshop on Dependable and Secure Nanocomputing with the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 2008. [51]T. S. Lin, Chin-Yung Lu, and S. Y. Kuo,” Quantum switching and quantum string matching,” Proc. of the 10th IEEE Conference on Nanotechnology, August 2010, accepted for published [52]S. Bouam, and B.O. Jalel, “Transmission security in ad hoc networks using multipath routing,” Proc. of the IEEE PIMRC, vol. 2, pp. 1331-1335, 2003. [53]V. Berman, and B. Mukherjee,”Transmission security in MANETs using multipath routing directional transmission,” IEEE Communications Magazine, vol. 5, pp. 2322 – 2328, Jun. 2006. [54]S. Bouam, and J. Ben-Othman, “Data security in ad hoc networks using multipath routing,” Proc. of the IEEE PIMRC, vol. 2, pp. 1331-1335, 2003. [55]H. Barnum, C. Crepear, d. Gottesman, A. Smith, and A. Tapp,"Authentication of quantum messages," Proc. of the 43rd Annual IEEE Symposiumon Foundations of Computer Science, pp.449-458. November 2002, [56]Y. L. Ju, I. M. Tsai, and S. Y. Kuo,"Performing Authenticated Encryption with Nanoscale Phenomenon," Proc. of the 5th IEEE Conference on Nanotechnology vol. 2 pp. 537-540, 2005. [57]I. M. Tsai, and S. Y. Kuo, “Digital switching in the quantum domain,” IEEE Trans. Nanotechnology, vol. 1, no. 5, pp. 154–164, Sep. 2002. [58]J. Hu, G. S. Ma, and D. Li, “Symbolic optimization method for reversible circuits,” EUROCON, pp. 521 – 524, Sep. 2007. [59]K. N. Patel, J. P. Hayes, and I. L. Markov, ”Fault testing for reversible circuits,” IEEE Trans. on Computer-Aided Design of Integrated Circuits and Systems, vol. 23, no. 8, pp. 1220-1230, Aug. 2004. [60]H. Rahaman, D.K Kole, D.K. Das, B.B. Bhattacharya, “Optimum test set for bridging fault detection in reversible circuits” Asian Test Symposium, pp. 125– 128, Oct. 2007. [61]T. S. Lin, I. M. Tsai, and S. Y. Kuo, ” Quantum transmission integrity mechanism for indirect communication,” Proc. of the 18th IEEE International Conference on Computer Communications and Networks, pp. 1-6, August 2009. [62]T. S. Lin, I. M. Tsai, H. W. Wang, and S. Y. Kuo, ” Quantum authentication and secure communication protocols,” Proc. of the 6th IEEE Conference on Nanotechnology, pp. 863-866, 2006. [63]Y. H. Chou, I. M. Tsai, and S. Y. Kuo, ”Quantum Boolean circuits are 1-testable,” IEEE Trans. on Nanotechnology, vol. 7, no. 4, pp. 484-492, Jul. 2008. [64]S. A. Wang, C. Y. Lu, I. M. Tsai, and S. Y. Kuo, “An XQDD-based verification method for quantum circuits,” IEICE Transactions, vol. 91-A(2), pp. 584–594, 2008. [65]I. L. Markov and J. P. Hayes, “Checking equivalence of quantum circuits and states,” In Int’l Conf. on CAD, pp. 69–74, 2007. [66]R. Wille, D. Grobe, D. M. Miler, and R. Drechsler, “Equivalence Checking of reversible circuits,” Proceedings of the 39th International Symposium on Multiple-Valued Logic, pp. 324–330, 2009. [67]X. Wen, and Y. Liu, “Quantum message signature scheme without an arbitrator,” IEEE International symposium on data, privacy and E-commerce, pp. 496–500, 2007. [68]J. Wang, Q. Zhang, and C. J. Tang, “Quantum signature scheme with message recovery,” ICACT, pp. 1375–1378, Feb. 2006. [69]T. Hwang, K. C. Lee, and C. M. Li, ”Provably secure three-party authenticated quantum key distribution protocols,” IEEE Trans. Dependable and Secure Computing, vol. 4, no 1, pp. 71–80, Jan-March 2007. [70]Y. Wang, H. Wang, Z. Li and J. Huang, ”Man-in-the-middle attack on BB84 protocol and its defence,” Proc. of the 2th IEEE Conference on Computer Science and Information Technology, pp. 438-439, 2009.
|