[1] S. Li and X. Y. Li, “Mobile Secure Payment Solution based on Encrypted SMS Verification Code,” Journal of Computer Applications, Vol. 37, No. 8, pp. 2270-2274, August 2017 [2] Y. Liu and H. Y. Ge, “NFC Security Payments Protocol with Cloud of Secure Elements,” Computer Engineering and Design, Vol. 38, No. 9, pp. 2363-2368, September 2017 [3] F. Xu and Y. J. Ye, “Design and Practice of a New Campus Card Payment System in Mobile Internet Scenarios,” Journal of Zhejiang University, Vol. 45, No. 1, pp. 60-64, January 2018 [4] R. Alléaume, C. Branciard, J. Bouda, T. Debuisschert, M. Dianati, N. Gisin, et al., “Using Quantum Key Distribution for Cryptographic Purposes: A Survey,” Theoretical Computer Science , Vol. 560, No. 1, pp. 62-81, December 2014 [5] D. X. Zhu, X. H. Li, R. K. Wei, J. N. Wu,L. J. Song, “A Quantum Identity Authentication Protocol based on Optical Transmission and Face Recognition,” International Journal of Online Engineering, Vol. 14, No. 4, pp. 58-69, April 2018 [6] J. W. Han, R. H. Liu, X. Sun,L. J. Song, “Identity-based Encryption Scheme based on Cloud and Quantum Keys,” Journal of Jilin University (Engineering and Technology Edition), Vol. 48, No. 2, pp. 551-557, March 2018 [7] J. Q. Wang, Z. C. Ma, X. Z. Li, L. Sun,C. W. Hu, “Quantum Secure Communication Network Architecture and Mobile Application Solution,”Telecommunications Science, No. 9, pp. 10-19, 2018 [8] M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, et al., “Field Test of Quantum Key Distribution in the Tokyo QKD Network,” Optics Express, Vol. 19, No. 11, pp. 10387-10409, 2011 [9] B. Korzh, C. C. W.Lim, R. Houlmann, N. Gisin, M. J. Li, D. Nolan, et al., “Provably Secure and Practical Quantum Key Distribution Over 307km of Optical Fibre,” Nature Photonics, Vol. 9, pp. 163-168, December 2015 [10] A. Rubenok, J. A. Slater, P. Chan, I. Lucio-Martinez,W. Tittel, “Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks,” Physical Review Letters, Vol. 111, No. 13, pp. 130501, October 2018 [11] D. Liu, S. Wang, J. Zhou, M. L. Xu, W. Chen,Z. P. Han, “Application of Quantum Keys in SSL VPN of Power Grid,” Power System Technology, Vol. 38, No. 2, pp. 544-548, February 2014 [12] Z. B. He, Z. P. Cai, Q. L. Han, W. T. Tong, L. M. Sun,Y. S. Li, “An Energy Efficient Privacy-Preserving Content Sharing Scheme in Mobile Social Networks,” Personal and Ubiquitous Computing, Vol. 20, No. 5, pp. 833-846, 2016 [13] G. L. Sun, T. Chen, Y. Y. Su,C. L. Li, “Internet Traffic Classification based on Incremental Support Vector Machines,” Mobile Networks and Applications, Vol. 23, No. 4, pp. 1-8, 2018 [14] G. C. Guo, H. Zhang,Q. Wang, “Review on Development of Quantum Information Technology,” Journal of Nanjing University of Posts and Telecommunications, Vol. 37, No. 3, pp. 1-14, March 2017 [15] X. P. Yang, H. T. Chen, L. C. Mei,P. Z. Wang, “Research on Quantum Key Distribution Technology in Intelligent Substation,” Telecommunications Science, No. 10, pp. 163-169, October 2018 [16] S. K. Liao, W. Q. Cai, W. Y. Liu, L. Zhang, Y. Li, J. G. Ren, et al., “Satellite-to-Ground Quantum Key Distribution,” Nature, Vol. 549, pp. 43-47, September 2017 [17] J. Huang, B. Xi, P. Li, F. Zhang,X. J. Zhao, “Method for Detecting Wiretapping Attack in Satellite Network based on Quantum Cryptography,” Computer Science, Vol. 43, No. 7, pp. 157-161, July 2016 [18] C. H.Bennett and G. Brassard, “Quantum Cryptography: Public Dey Distribution and Coin Tossing,” inProceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175-179, January 1984 |