[1]
Є. В. Васіліу and С. В. Ніколаєнко, “Analyses of the consistent eavesdropping attack of several eavesdroppers on the ping-pong protocol with entangled pairs of qubits”, Zahist ìnf., vol. 15, no. 1, pp. 39–48, Mar. 2013.