[1]
K.-S. . Shim, B. . Kim, and W. . Lee, “Research on Quantum Key, Distribution Key and Post-quantum Cryptography Key Applied Protocols for Data Science and Web Security”, JWE, vol. 23, no. 06, pp. 813–830, Nov. 2024.