Publication: How to overcome the ’Trusted Node Model...
Master data
Title: | How to overcome the ’Trusted Node Model’ in Quantum Cryptography |
Subtitle: | |
Abstract: | |
Keywords: |
Publication type: | Article in compilation (Authorship) |
Publication date: | 01.02.2009 (Print) |
Published by: |
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering
(
IEEE;
IEEE Computer Society
)
to publication |
Title of the series: | - |
Volume number: | - |
First publication: | Yes |
Page: | pp. 4 - 4 |
Versionen
Keine Version vorhanden |
Publication date: | 01.02.2009 |
ISBN: | - |
ISSN: | - |
Homepage: | - |
Authors
P. Schartner
No Data available
*
|
S Rass
No Data available
*
|
Peter Schartner (internal) |
Stefan Rass (internal) |
Assignment
Organisation | Address | ||||
---|---|---|---|---|---|
Fakultät für Technische Wissenschaften
Institut für Artificial Intelligence und Cybersecurity
|
AT - A-9020 Klagenfurt |
Categorisation
Subject areas | |
Research Cluster | No research Research Cluster selected |
Peer reviewed |
|
Publication focus |
Classification raster of the assigned organisational units:
|
working groups | No working group selected |
Cooperations
No partner organisations selected
Research activities
All related research activities to this publication are shown here. With the link below, you can view them in the search view where you are also able to export them.
Show related search activities in search
Projects: | No related projects |
Publications: | No related publications |
Events: | No related events |
Lectures: | No related lectures |
Articles of the publication
No related publications