Erich P. Stuntebeck, John S. Davis II, et al.
HotMobile 2008
We review the goals of cryptography, explain how quantum laws allow some of these goals to be attained that could not be otherwise, and comment on the future of quantum cryptography and the nature of its security.
Erich P. Stuntebeck, John S. Davis II, et al.
HotMobile 2008
M.J. Slattery, Joan L. Mitchell
IBM J. Res. Dev
Yun Mao, Hani Jamjoom, et al.
CoNEXT 2006
S.F. Fan, W.B. Yun, et al.
Proceedings of SPIE 1989