Logo des Repositoriums
 

Ways for confidential and authenticated hop-by-hop key establishment in QKDN

dc.contributor.authorHenrich, Johanna
dc.contributor.editorWendzel, Steffen
dc.contributor.editorWressnegger, Christian
dc.contributor.editorHartmann, Laura
dc.contributor.editorFreiling, Felix
dc.contributor.editorArmknecht, Frederik
dc.contributor.editorReinfelder, Lena
dc.date.accessioned2024-04-19T12:54:03Z
dc.date.available2024-04-19T12:54:03Z
dc.date.issued2024
dc.identifier.doi10.18420/sicherheit2024_024
dc.identifier.isbn978-3-88579-739-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/43965
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2024
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings Volume P-345
dc.titleWays for confidential and authenticated hop-by-hop key establishment in QKDNen
dc.typeText/Conference Paper
gi.citation.endPage306
gi.citation.publisherPlaceBonn
gi.citation.startPage301
gi.conference.date09.-11.04.2024
gi.conference.locationWorms
gi.conference.sessiontitlePromovierendenforum

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
B2-3.pdf
Größe:
284.7 KB
Format:
Adobe Portable Document Format