Introduction.- Preliminaries.- Typical quantum network coding schemes.- Quantum network coding based on repeaters.- Quantum network coding based on controllers.- Opportunistic quantum network coding.- Quantum network coding with authentication.- Quantum network coding for continuous variables.- Security analysis of quantum cryptographic protocols.- Security analysis based on BAN logic.- Security analysis based on quantum random oracle model.- Security analysis of quantum obfuscation.- Security analysis of measurement-device independency.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.