Alléaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., . . . Zeilinger, A. (2014). Using quantum key distribution for cryptographic purposes: A survey. Theoretical computer science, 560(1), 62-81. https://doi.org/10.1016/j.tcs.2014.09.018
Chicago-Zitierstil (17. Ausg.)Alléaume, R., et al. "Using Quantum Key Distribution for Cryptographic Purposes: A Survey." Theoretical Computer Science 560, no. 1 (2014): 62-81. https://doi.org/10.1016/j.tcs.2014.09.018.
MLA-Zitierstil (9. Ausg.)Alléaume, R., et al. "Using Quantum Key Distribution for Cryptographic Purposes: A Survey." Theoretical Computer Science, vol. 560, no. 1, 2014, pp. 62-81, https://doi.org/10.1016/j.tcs.2014.09.018.
Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.