Funder
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications
Key Lab of Information Network Security, Ministry of Public Security
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modeling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference40 articles.
1. Gandawati, T.S.: Analisis Proses Adopsi Electronic Payment System Dengan Menggunakan UTAUT Model. Universitas Gunadarma, Skripsi. Makassar (2007)
2. Junadi, S.: A model of factors influencing consumer’s intention to use e-payment system in Indonesia. Procedia Comput. Sci. 59, 214–220 (2015)
3. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)
4. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
5. Lo, H.-K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154 (1997)