Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of trusted repeater quantum key distribution networks., , , , , and . J. Comput. Secur., 18 (1): 61-87 (2010)Symbiotic joint operation of quantum and classical coherent communications., , , and . OFC, page 1-3. IEEE, (2022)Long-Range QKD without Trusted Nodes is Not Possible with Current Technology., , , , , , , , , and 4 other author(s). CoRR, (2022)SECOQC White Paper on Quantum Key Distribution and Cryptography, , , , , , , , , and 13 other author(s). CoRR, (2007)Architecture of the Secoqc Quantum Key Distribution network., and . ICQNM, page 13. IEEE Computer Society, (2007)Transport Layer Protocols for the Secoqc Quantum Key Distribution (QKD) Network., and . LCN, page 1025-1034. IEEE Computer Society, (2007)Multidimensional reconciliation for continuous-variable quantum key distribution., , , , and . ISIT, page 1020-1024. IEEE, (2008)Multidimensional reconciliation for continuous-variable quantum key distribution., , , , and . CoRR, (2007)Architecture and protocols of the future European quantum key distribution network., , , and . Secur. Commun. Networks, 1 (1): 57-74 (2008)Quantum key distribution and cryptography: a survey., , , , , , , , , and 14 other author(s). Classical and Quantum Information Assurance Foundations and Practice, volume 09311 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)