فهرست منابع
افجه، سید علیاکبر و حمزهپور، مهدی. (1393). رهیافتی جامع از نظریه رهبری کوانتومی و کاربردهای آن در سازمان. اندیشه مدیریت راهبردی، 8(2)، 161-204.
محمدهادی، فریبرز. (1390). پارادایم کوانتومی در علم مدیریت. مدیریت فرهنگ سازمانی، 9(23)، 71-94.
Bennett, C. H., & Gilles, B. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE. International Conference on Computers, Systems and Signal Processing, 175-179.
Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21), 3121-3132.
Buchmann, J. (2004). Introduction to Cryptography. Second Edition, Springer.
Dyer, W. W. (1995). Your sacred self. HarperCollins Audio Books.
Ekert, A. K. (1991). Quantum cryptography based on Bell's theorem. Physical Review Letters 67(6), 661-663.
Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1) 145-159.
Gobby, C., Yuan, Z. L., & Shields, A. J. (2004). Quantum key distribution over 122 km of standard telecom fiber. Applied Physics Letters, 84(19), 3762-3764.
Gottesman, D., Lo, H. K., Lütkenhaus, N., & Preskill, J. (2004). Security of quantum key distribution with imperfect devices. In Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on (p. 136). IEEE.
Jennewein, T., Simon, C., Weihs, G., Weinfurter, H., & Zeilinger, A. (2000). Quantum cryptography with entangled photons. Physical Review Letters, 84(20), 4729-4735.
Karakas, F. (2009). New paradigms in organizational development in the 21st century: Positivity, spirituality, and complexity. Organization Development Journal, 27(1), 245-251.
Kollmitzer, C., & Mario, P. eds. (2010). Applied quantum cryptography. Vol. 797. Springer.
Kuhn, T. S. (2012). The structure of scientific revolutions. University of Chicago press.
Ladd, T. D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., & O’Brien, J. L. (2010). Quantum computers. Nature, 464(7285), 45-53.
Lütkenhaus, N. (1999). Estimates for practical quantum cryptography. Physical Review, 59(5), 3301-3314.
Lütkenhaus, N. (2000). Security against individual attacks for realistic quantum key distribution. Physical Review, 61(5), 52304-52314.
Mayers, D. (2001). Unconditional security in quantum cryptography. Journal of the ACM (JACM), 48(3), 351-406.
Overman, E. S. (1996). The new science of management Chaos and quantum theory and method. Journal of Public Administration Research and Theory, 6(1), 75-89.
Buchmann, J. (2004). Introduction to Cryptography. Springer-Verlag.
Kollmitzer, C., & Pivk, M. (2010). Applied Quantum Cryptography. Springer.
Rogers, D. J. (2010). Broadband Quantum Cryptography. Morgan and Claypool Publishers.
Tittel, W., Brendel, J., Zbinden, H., & Gisin, N. (2000). Quantum cryptography using entangled photons in energy-time Bell states. Physical Review Letters, 84(20), 4737-4740.
Waks, E., Zeevi, A., & Yamamoto, Y. (2002). Security of quantum key distribution with entangled photons against individual attacks. Physical Review, 65(5), 52310-52326.