[1]
|
Bennett, C.H. and Brassard, G. (1984) Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 10-12 dEcember 1984, 175-179.
|
[2]
|
Gerard, J.H. (1997) The Model Checker SPIN. IEEE Transactions on Software Engineering, 23, 279-295.
|
[3]
|
prismmodelchecker. http://www.prismmodelchecker.org/
|
[4]
|
Elboukhari, M., Azizi, M. and Azizi, A. (2009) Implementation of Secure Key Distribution Based on Quantum Cryptography. Proceedings of IEEE International Conference on Multimedia Computing and Systems (ICMCS’09), Ouarzazate, 2-4 April 2009, 361-365.
|
[5]
|
Elboukhari, M., Azizi, M. and Azizi, A. (2010) Analysis of Quantum Cryptography Protocols by Model Checking. IJUCS, 1, 34-40.
|
[6]
|
Elboukhari, M., Azizi, M. and Azizi, A. (2010) Analysis of the Security of BB84 by Model Checking. International Journal of Network Security & Its Applications (IJNSA), 2, 87-97.
|
[7]
|
Papanikolaou, N.K. (2004) Techniques for Design and Validation of Quantum Protocols. University of Warwick, Coventry.
|
[8]
|
Siddiqui, M.A. and Qureshi, T. (2014) Quantum Key Distribution with Qubit Pairs. Journal of Quantum Information Science, 4, 129-132. http://dx.doi.org/10.4236/jqis.2014.43014
|
[9]
|
Sahoo, J.R. and Satapathy, S. (2011) Simulation and Analysis of BB84 Protocol by Model Checking. International Journal of Engineering Science and Technology, 3, 5695.
|