TONG Xiao-yang WANGXiao-ru.Inference and countermeasure presupposition of network attack in incident on Ukrainian power grid[J].Automation of Electric Power Systems,2016,40(7):144-148.
[5]BENNETT CH,BRASSARDG.Quantum cryptography: public key distribution and coin tossing[C]// Proc. IEEE International Conference on Computers Systems and Signal Processing.IEEE,1984:175-179.
[6]BRASSARDG,LUTKENHAUSN,MORT,et al.Limitations on practical quantum cryptography[J].Physical Review Letters,2000,85(6):1330.
[7]BRASSARDG,MORT,SANDERS BC.Security aspects of practical quantum cryptography[C]// International Conference on Theory and Application ofCryptographic Techniques. Springer-Verlag,2000:289-299.
[8]BRASSARDG,MORT,SANDERS BC.Quantum cryptography via parametric down conversion[M].Springer US,2002.
[9]HWANG WY.Quantum key distribution with high loss: toward global secure communication.[J].Physical Review Letters,2003,91(5):057901.
[10]WANG XB.Beating the PNS attack in practical quantum cryptography[J].Physical Review Letters,2004,94(23):230503.
[11]LO HK,MAX,CHENK.Decoy state quantum key distribution.[J].Physical Review Letters,2005,94(23):230504.
ZHOUJing,LULi-feng,LEIYu-qing.Research of dedicated QKD system in power grid[J].Optical Communication Technology,2014,38(7):39-41.
[15]YIN HL,CHEN TY,YU ZW,et al.Measurement-device-independent quantum key distribution over a 404 km optical fiber[J].Physical Review Letters,2016,117(19):190501.