Ways for confidential and authenticated hop-by-hop key establishment in QKDN
dc.contributor.author | Henrich, Johanna | |
dc.contributor.editor | Wendzel, Steffen | |
dc.contributor.editor | Wressnegger, Christian | |
dc.contributor.editor | Hartmann, Laura | |
dc.contributor.editor | Freiling, Felix | |
dc.contributor.editor | Armknecht, Frederik | |
dc.contributor.editor | Reinfelder, Lena | |
dc.date.accessioned | 2024-04-19T12:54:03Z | |
dc.date.available | 2024-04-19T12:54:03Z | |
dc.date.issued | 2024 | |
dc.identifier.doi | 10.18420/sicherheit2024_024 | |
dc.identifier.isbn | 978-3-88579-739-5 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/43965 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2024 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings Volume P-345 | |
dc.title | Ways for confidential and authenticated hop-by-hop key establishment in QKDN | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 306 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 301 | |
gi.conference.date | 09.-11.04.2024 | |
gi.conference.location | Worms | |
gi.conference.sessiontitle | Promovierendenforum |
Dateien
Originalbündel
1 - 1 von 1