簡易檢索 / 詳目顯示

研究生: 林晶瑩
Lin, Ching-Ying
論文名稱: 安全的量子對話
Secure Quantum Dialogue
指導教授: 黃宗立
Hwang, Tzonelih
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 110
中文關鍵詞: 量子對話具身份認證的量子對話資訊洩露中間人攻擊
外文關鍵詞: Quantum dialogue, Authenticated quantum dialogue, Information leakage, Man-in-the-middle attack
相關次數: 點閱:110下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,隨著量子電腦與量子演算法的快速發展,許多安全性植基於數學難題的傳統密碼學協定開始面臨被破解的威脅。由於利用量子的物理特性所設計出來的通訊協定可達到無條件安全,因此各種量子密碼學的應用陸續地被提出。本論文專注於量子對話(quantum dialogue, QD)協定及具身份認證的量子對話(authenticated quantum dialogue, AQD)協定的研究與設計。量子對話協定可讓兩個使用者同時交換彼此的訊息,而具身份認證的量子對話協定則是可讓兩個使用者確認彼此的身份且同時交換訊息。在本論文的研究過程中,發現現存的協定存在一些問題:(1)資訊洩露(information leakage);(2)中間人攻擊(man-in-the-middle attack);(3)缺乏驗證訊息完整性;(4)耗費大量光子使效率低落。因此,如何設計安全且具高效率的量子對話協定與具身份認證的量子對話協定是相當重要的議題。
    首先,本論文將指出許多現存的量子對話協定仍然存在資訊洩露的問題,並且也指出現存的具身份認證的量子對話協定無法抵禦中間人攻擊。基於貝爾糾結態(Bell states)與單光子(single photons),本論文提出兩個安全的量子對話協定以及兩個具身份認證的量子對話協定。其方法結合了傳統密碼學技術與量子物理特性之優點,將傳統密碼學的單向雜湊函數(one-way hash function)引入協定中,使協定能驗證訊息的完整性且有效防範多種常見的攻擊。此外,提出的協定也不會出現資訊洩露及中間人攻擊。因此,相較於現存的協定,本論文提出的協定不僅安全而且效率高。

    The rapid development of quantum computers and quantum algorithms in recent years implies that many communication protocols based on the mathematical difficulties of traditional cryptography will be broken. Because quantum protocols based on physical properties can provide unconditional security, various research areas in quantum cryptography have been proposed. This thesis focuses on the secure design of a quantum dialogue (QD) protocol and an authenticated quantum dialogue (AQD) protocol. QD protocols allow two communicants to exchange their secret messages simultaneously, whereas AQD protocols allow two communicants to perform mutual authentication and to engage in secure bidirectional communication simultaneously via classic public channels. Numerous QD protocols and AQD protocols have been proposed in previous studies; however, these protocols have the following drawbacks: (1) many QD protocols experience the information leakage problem; (2) many AQD protocols are vulnerable to a man-in-the-middle attack; (3) all QD and AQD protocols fail to consider the problem of message integrity; and (4) these protocols have low efficiency because large numbers of photons are wasted. Thus, designing secure and efficient QD and AQD protocols is an important issue. In this thesis, we first demonstrate that existing QD protocols still experience the information leakage problem, and we show that existing AQD protocols are susceptible to man-in-the-middle attacks. Next, we propose two separate QD protocols based on Bell states and single photons, respectively. Finally, we present two separate AQD protocols based on Bell states and single photons, respectively. Our protocols integrate the technique of classical cryptography with the advantages of quantum computing. In the protocols, we use a one-way hash function to verify the integrity of received secret messages and to resist several well-known attacks. Moreover, the proposed protocols are free of the information leakage problem and they are not vulnerable to man-in-the-middle attacks. Thus, the proposed protocols are secure and more efficient compared to existing protocols.

    中文摘要 IV Abstract V 誌謝 VII Contents VIII List of Tables X Chapter 1 Introduction 1 1.1 Quantum Dialogue Protocols 1 1.2 Authenticated Quantum Dialogue Protocols 6 1.3 Motivation and Contributions 7 1.4 Thesis Structure 8 Chapter 2 Review of Quantum Cryptography 9 2.1. Quantum Bits and Their Properties 9 2.2. Bell States and Their Properties 10 2.3. Unitary Operations 12 Chapter 3 Security Analysis of Existing Protocols 14 3.1 Information Leakage on QD Protocols 14 3.2 Man-in-the-Middle Attack on AQD Protocols 32 3.3 Summary 36 Chapter 4 Proposed Quantum Dialogue Protocols 38 4.1 Quantum Dialogue Protocol Based on Bell States 38 4.1.1 The Proposed QD Protocol 38 4.1.2 Security Analysis 43 4.1.3 Comparison 50 4.2 Quantum Dialogue Protocol Based on Single Photons 53 4.2.1 The Proposed QD Protocol 53 4.2.2 Security Analysis 57 4.2.3 Comparison 64 Chapter 5 Authenticated Quantum Dialogue Protocols 67 5.1 Authenticated Quantum Dialogue Protocol Based on Bell States 67 5.1.1 The Proposed AQD Protocol 67 5.1.2 Security Analysis 73 5.1.3 Comparison 76 5.2 Authenticated Quantum Dialogue Protocol Based on Single Photons 79 5.2.1 The Proposed AQD Protocol 79 5.2.2 Security Analysis 82 5.2.3 Comparison 85 Chapter 6 Conclusions 87 Bibliography 90

    [1] B. A. Nguyen, "Quanutm dialogue," Physics Letters A, vol. 328, no. 1, pp. 6-10, 2004.
    [2] A. Einstein, P. Podolsky, and S. Rosen, "Can quantum-mechanical description of physical reality be considered complete?," Physical Review, vol. 47, no. 10, pp. 777-780, 1935.
    [3] Z. X. Man, Z. J. Zhang, and Y. Li, "Quanutm dialogue revisited," Chinese Physics Letters, vol. 22, no. 1, pp. 22-24, 2005.
    [4] Z. X. Man and Y. J. Xia, "Secure deterministic bidirectional communication without entanglement," International Journal of Quantum Information, vol. 4, no. 4, pp. 739-746, 2006.
    [5] M. Lucamarini and S. Mancini, "Secure deterministic communication without entanglement," Physical Review Letters, vol. 94, pp. 140501-1-140501-4, 2005.
    [6] X. Ji and S. Zhang, "Secure quntum dialogue based on single-photon," Chinese Physics, vol. 15, no. 7, pp. 1418-1420, 2006.
    [7] F. G. Deng, X. H. Li, C. Y. Li, P. Zhou, and H. Y. Zhou, "Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs," Physics Letters A, vol. 359, no. 5, pp. 359-365, 2006.
    [8] Y. Xia, C. B. Fu, S. Zhang, S. K. Hong, K. H. Yeon, and C. L. Um, "Quantum dialogue by using GHZ state," Journal of the Korean Physical Society, vol. 48, no. 1, pp. 24-27, 2006.
    [9] Z. X. Man, Y. J. Xia, and B. A. Nguyen, "Quantum secure direct communication by using GHZ states and entanglement swapping," Journal of Physics B: Atomic, Molesular and Optical Physics, vol. 39, no. 18, pp. 3855-3863, 2006.
    [10] Z. X. Man and Y. J. Xia, "Controlled bidirectiional quantum dirct communication by using a GHZ state," Chinese Physics Letters, vol. 23, no. 7, pp. 1680-1682, 2006.
    [11] X. R. Jin, X. Ji, Y. Q. Zhang, S. Zhang, S. K. Hong, K. H. Yeon, and C. I. Um, "Three-party quantum secure direct communication based on GHZ states," Physics Letters A, vol. 354, no. 1-2, pp. 67-70, 2006.
    [12] Z. X. Man and Y. J. Xia, "Improvement of security of three-party quantum secure direct communication based on GHZ states," Chinese Physics Letters, vol. 24, no. 1, pp. 15-18, 2007.
    [13] Y. G. Yang and Q. Y. Wen, "Quasi-secure quantum dialogue using single photons," Science in China Series G: Physics, Mechanics & Astronomy, vol. 5, no. 5, pp. 558-562, 2007.
    [14] Y. Chen, Z. X. Man, and Y. J. Xia, "Quantum bidirectional secure direct communication via entanglement swapping," Chinese Physics Letters, vol. 24, no. 1, pp. 19-22, 2007.
    [15] Y. Xia, J. Song, and H. S. Song, "Quantum dialogue using non-maximally entangled states based on entanglement swapping," Physica Scripta, vol. 76, no. 4, pp. 363-369, 2007.
    [16] Y. J. Xia and Z. X. Man, "Controlled quantum N-party simultaneous direct communication," Communication in Theoretical Physics, vol. 48, no. 1, pp. 79-82, 2007.
    [17] Y. Xia, J. Song, J. Nie, and H. S. Song, "Controlled secure quantum dialogue using a pure entangled GHZ states," Communication in Theoretical Physics, vol. 48, no. 5, pp. 841-846, 2007.
    [18] L. Dong, X. M. Xiu, Y. J. Gao, and F. Chi, "A controlled quantum dialogue protocol in the network using entanglement swapping," Optics Communications, vol. 281, no. 24, pp. 6135-6138, 2008.
    [19] F. Gao, S. J. Qin, and Q. Y. Wen, and F. C. Zhu, "Comment on: 'Three-party quantum secure direct communication based on GHZ states'," Physics Letters A, vol. 372, no. 18, pp. 3333-3336, 2008.
    [20] F. Gao, F. Z. Guo, Q. Y. Wen, and F. C. Zhu, "Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication," Science in China Series G: Physics, Mechanics and Astronomy, vol. 51, no. 5, pp. 559-566, 2008.
    [21] Y. G. Tan and Q. Y. Cai, "Classical correlation in quantum dialogue," International Journal of Quantum Information, vol. 6, no. 2, pp. 325-329, 2008.
    [22] G. F. Shi, X. Q. Xi, X. L. Tian, and R. H. Yue, "Bidirectional quantum secure communication based on shared private Bell state," Optics Communications, vol. 282, no. 12, pp. 2460-2463, 2009.
    [23] C. J. Shan, J. B. Liu, W. W. Cheng, T. K. Liu, Y. X. Huang, and H. Li, "Bidirectional quantum secure communication in driven cavity QED," Modern Physics Letters B, vol. 23, no. 27, pp. 3325-3234, 2009.
    [24] L. L. Zhang and Y. B. Zhan, "Quantum dialogue by using the two-qutrit entangled states," Modern Physics Letters B, vol. 23, no. 25, pp. 2993-2998, 2009.
    [25] L. Dong, X. M. Xiu, Y. J. Gao, and F. Chi, "Quantum dialogue protocol using a class of three-photon W states," Communications in Theoretical Physics, vol. 52, no. 5, pp. 853-856, 2009.
    [26] G. F. Shi, X. Q. Xi, M. L. Hu, and R. H. Yue, "Quantum secure dialogue by using single photons," Optics Communications, vol. 283, no. 9, pp. 1984-1986, 2010.
    [27] C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distributiion and coin tossing," Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, Dec. 1984.
    [28] G. F. Shi and X. L. Tian, "Quantum secure dialogue based on single photons and controlled-not operations," Journal of Modern Optics, vol. 57, no. 20, pp. 2027-2030, 2010.
    [29] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Reviews of Modern Physics, vol. 74, no. 1, pp. 145-195, 2002.
    [30] F. G. Deng, P. Zhou, X. H. Li, C. Y. Li, and H. Y. Zhou, "Robustness of two-way quantum communication protocols against Trojan horse attack," http://arxiv.org/pdf/quant-ph/0508168v1.pdf, 2005.
    [31] Q. Y. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Physics Letters A, vol. 351, no. 1-2, pp. 23-25, 2006.
    [32] X. H. Li, F. G. Deng, and H. Y. Zhou, "Improving the security of secure direct communication based on secret transmitting order of particles," Physical Review A, vol. 74, no. 5, pp. 054302-1-054302-4, 2006.
    [33] G. F. Shi, "Bidirectional quantum secure communication based on Bell states and auxiliary particles," Optics Communications, vol. 283, no. 24, pp. 5275-5278, 2010.
    [34] G. Gao, "Two quantum dialogue protocols without information leakage," Optics Communications, vol. 283, no. 10, pp. 2288-2293, 2010.
    [35] Y. B. Zhan, L. L. Zhang, Y. W. Wang, and Q. Y. Zhang, "Quantum dialogue by using non-symmetric quantum channel," Communications in Theoretical Physics, vol. 53, no. 4, pp. 648-652, 2010.
    [36] G. Gao and L. P. Wang, "A protocol for bidirectional quantum secure communication based on genuine four-particle entangled states," Communications in Theoretical Physics, vol. 54, no. 3, pp. 447-451, 2010.
    [37] F. Sheikhehi and M. Naseri, "Probabilistic bidirectional quantum secure communication based on a shared partially entangled states," International Journal of Quantum Information, vol. 9, no. supp01, pp. 357-365, 2011.
    [38] G. Gao, M. Fang, Y. Wang, and D. J. Zang, "A ping-pong quantum dialogue scheme using genuine four-particle entangled states," International Journal of Theoretical Physics, vol. 50, no. 10, pp. 3089-3095, 2011.
    [39] H. Liu, X. L. Zhang, and H. Lu, "Eavesdropping on the quntum dialogue protocol in lossy channel," Chinese Physics B, vol. 20, no. 7, pp. 07030501-070305-5, 2011.
    [40] A. Wόjcik, "Eavesdropping on the "ping-pong" quantum communication protocol," Physical Review Letters, vol. 90, no. 15, pp. 157901-1-157901-4, 2003.
    [41] Z. J. Zhang, Z. X. Man, and Y. Li, "Improving Wόjcik’s eavesdropping attack on the ping-pong protocol," Physics Letters A, vol. 333, no. 1-2, pp. 46-50, 2004.
    [42] X. R. Yin, W. P. Ma, and W. Y. Liu, "Efficient bidirectional quantum secure communication with two-photon entanglement," Quantum Information Processing, vol. 12, no. 9, pp. 3093-3102, 2013.
    [43] H. Wang, Y. Q. Zhang, and Y. P. Hu, "Efficient quantum dialogue by using the two-qutrit entangled states without information leakage," International Journal of Theoretical Physics, vol. 52, no. 6, pp. 1745-1750, 2013.
    [44] T. Y. Ye, "Large payload bidirectional quantum secure direct communication without information leakage," International Journal of Quantum Information, vol. 11, no. 5, pp. 135005-1-135005-13, 2013.
    [45] N. R. Zhou, G. T. Wu, L. H. Gong, and S. Q. Liu, "Secure Quantum Dialogue Protocol Based on W States Without Information Leakage," International Journal of Theoretical Physics, vol. 52, no. 9, pp. 3204-3211, 2013.
    [46] Y. Chang, S. B. Zhang, and L. L. Yan, "A bidirectional quantum secure direct communication protocol based on five-particle cluster state," Chinese Physics Letters, vol. 30, no. 9, pp. 090301-1-090301-4, 2013.
    [47] C. Shukla, V. Kothari, A. Banerjee, and A. Pathak, "On the group-theoretic structure of a class of quantum dialogue protocols," Physics Letters A, vol. 377, no. 7, pp. 518-527, 2013.
    [48] C. W. Yang and T. Hwang, "Quantum dialogue protocols immune to collective noise," Quantum Information Processing, vol. 12, no. 6, pp. 2131-2142, 2013.
    [49] Y. H. Li, X. L. Li, M. H. Sang, Y. Y. Nie, and Z. S. Wang, "Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled state," Quantum Information Processing, vol. 12, no. 12, pp. 3835-3844, 2013.
    [50] T. Y. Ye and L. Z. Jiang, "Improvement of controlled bidirectional quantum direct dommunication using a GHZ state," Chinese Physics Letters, vol. 30, no. 4, pp. 040305-1-040305-4, 2013.
    [51] Z. H. Liu and H. W. Chen, "Comment on 'improvement of controlled bidirectional quantum direct communicaiton using a GHZ state'," Chinese Physics Letters, vol. 30, no. 7, pp. 079901, 2013.
    [52] T. Y. Ye and L. Z. Jiang, "Reply to the comment on 'improvement of controlled bidirectional quantum direct communication using a GHZ state'," Chinese Physics Letters, vol. 30, no. 7, pp. 079902, 2013.
    [53] C. Zheng and G. F. Long, "Quantum secure direct dialogue using Einsten-Podolsky-Rosen pairs," SCIENCE CHINA Physics, Mechanics & Astronomy, vol. 57, no. 7, pp. 1238-1243, 2014.
    [54] T. Y. Ye and L. Z. Jiang, "Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state," Physics Scripta, vol. 89, no. 1, pp. 015103-1-015103-7, 2014.
    [55] A. H. Yin and Z. H. Tang, "Two-Step Efficient Quantum Dialogue with Three-Particle Entangled W State," International Journal of Theoretical Physics, DOI 10.1007/s10773-014-2072-2, 2014.
    [56] G. Gao, "Bidirectional quantum secure communication based on one-dimensional four-particle cluster states," International Journal of Theoretical Physics, vol. 53, no. 7, pp. 2282-2287, 2014.
    [57] M. Naseri, "An efficient protocol for quantum secure dialogue with authentication by using single photons," International Journal of Quantum Information, vol. 9, no. 7, pp. 1677-1684, 2011.
    [58] D. Shen, W. Ma, X. Yin, and W. Li, "Quantum dialogue with authentication based on Bell states," International Journal of Theoretical Physics, vol. 52, no. 6, pp. 1825-1835, 2013.
    [59] Y. Chang, S. B. Zhang, L. L. Yan, and Z. W. Sheng, "A Multiparty controlled bidirectional quantum secure direct communication and authenticatioin protocol based on EPR pairs," Chinese Physics Letters, vol. 30, no. 6, pp. 060301-1-060301-4, 2013.
    [60] G. T. Wu, N. R. Zhou, L. H. Gong, and S. Q. Liu, "Quantum dialogue protocols with identification over collection noisy channel without information leakage," Acta Physics Sinica, vol. 63, no. 6, pp. 060302-1-060302-8, 2014.
    [61] FIPS180-1, "Secure hash standard," NIST, US Department of Commerce, Washington D. C., April 1995.
    [62] B. Preneel, H. Dobbertin, and A. Bosselaers, "The cryptographic hash function RIPREMD-160," Crypto Bytes, vol. 3, no. 2, pp. 9-14, 1997.
    [63] Z. J. Zhang, Z. X. Man, and Y. Li, "Improving Wόjcik eavesdropping attack on the ping-pong protocol," Physics Letters A, vol. 333, no. 1-2, pp. 46-50, 2004.
    [64] Z. X. Man, Z. J. Zhang, and Y. Li, "Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations," Chinese Physics Letters, vol. 22, no. 1, pp. 18-22, 2005.
    [65] Z. J. Zhang, Z. X. Man, and Y. Li, "The improved Bostrom-Felbinger protocol against attacks without eavesdropping," International Journal of Quantum Information, vol. 2, no. 4, pp. 521-527, 2004.
    [66] J. Liu, Y. M. Liu, H. J. Cao, S. H. Shi, and Z. J. Zhang, "Revisiting quantum secure direct communication with W state," Chinese Physics Letters, vol. 23, no. 10, pp. 2652-2655, 2006.
    [67] Z. J. Zhang, J. Liu, D. Wang, and S. H. Shi, "Comment on "Quantum direct communication with authentication"," Physical Review A, vol. 75, no. 2, pp. 026301-1-026301-4, 2007.
    [68] H. Yuan, Y. M. Liu, W. Zhang, and Z. J. Zhang, "Eavesdropping on quantum secure direct communication with W state in noisy channel," Communications in Theoretical Physics, vol. 49, no. 1, pp. 103-106, 2008.
    [69] J. Liu, Y. M. Liu, Y. Xia, and Z. J. Zhang, "Revisiting controoled quantum secure direct communcation using a non-symmetric quantum channel with quantum superdense coding," Communications in Theoretical Physics, vol. 49, no. 4, pp. 887-890, 2008.
    [70] A. R. Calderbank and P. W. Shor, "Good quantum error-correcting codes exist," Physical Review A, vol. 54, no. 2, pp. 1098-1105, 1996.
    [71] A. R. Calderbank, E. M. Rains, P. W. Shor, and N. J. A. Sloane, "Quantum error correction and orhtogonal geometry," Physical Review Letters, vol. 78, no. 3, pp. 405-408, 1997.
    [72] A. Ekert and C. Macchiavello, "Quantum error correction for communication," Physical Review Letters, vol. 77, no. 12, pp. 2585-2588, 1996.
    [73] D. Gottesman, "Class of quantum error-correcting codes saturating the quantum hamming bound," Physical Review A, vol. 54, no. 3, pp. 1862-1868, 1996.
    [74] E. Knill, R. Laflamme, and L. Viola, "Theory of quantum error correction for general noise," Physical Review Letters, vol. 84, no. 11, pp. 2525-2528, 2000.
    [75] R. Laflamme, C. Miquel, J. P. Paz, and W. H. Zurek, "Perfect quantum error correcting code," Physical Review Letters, vol. 77, no. 1, pp. 198-201, 1996.
    [76] P. W. Shor, "Scheme for reducing decoherence in quantum computer memory," Physical Review A, vol. 52, no. 4, pp. R2493-R2496, 1995.
    [77] F. Gao, Q. Y. Wen, and F. C. Zhu, "Teleportation attack on the QSDC protocol with a random basis and order," Chinese Physics B, vol. 17, no. 9, pp. 3189-3193, 2008.
    [78] F. Gao, S. Lin, Q. Y. Wen, and F. C. Zhu, "A special eavesdropping on one-sender versus n-receiver QSDC protocol," Chinese Physics Letters, vol. 25, no. 5, pp. 1561-1563, 2008.
    [79] S. J. Qin, Q. Y. Wen, L. M. Meng, and F. C. Zhu, "Comment on "Controlled DSQC using five-qubit entangled states and two-step security test"," Optics Communications, vol. 282, no. 13, pp. 2656-2658, 2009.
    [80] G. Gao, S. J. Qin, Q. Y. Wen, and F. C. Zhu, "Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state," Optics Communications, vol. 283, no. 1, pp. 192-195, 2010.
    [81] F. Gao, F. Z. Guo, Q. Y. Wen, and F. C. Zhu, "Forcible-measurement attack on quantum secure direct communication protocol with cluster state," Chinese Physics Letters, vol. 25, no. 8, pp. 2766-2769, 2008.
    [82] T. Hwnag. C. C. Hwang, C. W. Yang, and C. M. Li, "Revisiting Deng et al.’s multiparty quantum secret sharing protocol," International Journal of Theoretical Physics, vol. 50, no. 9, pp. 2790-2798, 2011.
    [83] J. Lin, H. Y. Tseng, and T. Hwang, "Intercept-resend attacks on Chen et al.’s quantum private comparison protocol and the improvements," Optics Communications, vol. 284, no. 9, pp. 2412-2414, 2011.
    [84] J. Lin and T. Hwang, "An enhancement on Shi et al.’s multiparty quantum secret sharing protocol," Optics Communications, vol. 284, no. 5, pp. 1468-1471, 2011.
    [85] S. K. Chong, C. W. Tsai, and T. Hwang, "Improvement on "Quantum key agreement protocol with maximally entangled states"," International Journal of Theoretical Physics, vol. 50, no. 6, pp. 1793-1802, 2011.
    [86] H. Y. Tseng, T. Hwang, and C. Y. Lin, "On the "Deterministic secure quantum communication using four-particle entangled state and entanglement swapping"," Journal of Information Science and Engineering, vol. 28, no. 3, pp. 471-478, 2012.
    [87] C. W. Yang, T. Hwang, and Y. P. Luo, "Enhancement on "Quantum blind signature based on two-state vector formalism"," Quantum Information Processing, vol. 12, no. 1, pp. 109-117, 2013.

    下載圖示 校內:2024-08-31公開
    校外:2024-08-31公開
    QR CODE