S. Abramsky & B. Coecke (2004):
A categorical semantics of quantum protocols.
In: Logic in Computer Science, 2004. Proceedings of the 19th Annual IEEE Symposium on,
pp. 415 – 425,
doi:10.1109/LICS.2004.1319636.
C. Bennett (1992):
Quantum cryptography using any two nonorthogonal states.
Physical Review Letters 68(21),
pp. 3121–3124,
doi:10.1103/PhysRevLett.68.3121.
C. Bennett, G. Brassard & N. Mermin (1992):
Quantum cryptography without Bell's theorem.
Physical Review Letters 68(5),
pp. 557–559,
doi:10.1103/PhysRevLett.68.557.
C. Bennett & S. Wiesner (1992):
Communication via one- and two-particle operators on Einstein-Podolsky-łinebreak Rosen states.
Phys. Rev. Lett. 69(20),
pp. 2881–2884,
doi:10.1103/PhysRevLett.69.2881.
B. Coecke & B. Edwards (2010):
Three qubit entanglement within graphical Z/X-calculus.
In: HPC,
pp. 22–33.
Available at http://arxiv.org/abs/1103.2811.
B. Coecke & S. Perdrix (2010):
Environment and classical channels in categorical quantum mechanics.
In: Proceedings of the 24th international conference/19th annual conference on Computer science logic,
CSL'10/EACSL'10.
Springer-Verlag,
pp. 230–240,
doi:10.1007/978-3-642-15205-4 20.
Available at http://arxiv.org/abs/1004.1598.
F.-G. Deng, X.-H. Li, C.-Y. Li, P. Zhou & H.-Y. Zhou (2005):
Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs.
Physical Review A 72(4),
pp. 044301,
doi:10.1103/PhysRevA.72.044301.
W. Dür, G. Vidal & J. I. Cirac (2000):
Three qubits can be entangled in two inequivalent ways.
Physical Review A 62(6),
pp. 062314,
doi:10.1103/PhysRevA.62.062314.
A. Ekert (1991):
Quantum cryptography based on Bell's theorem.
Physical Review Letters 67(6),
pp. 661–663,
doi:10.1103/PhysRevLett.67.661.
V. N. Gorbachev, A. I. Trubilko, A. I. Zhiliba & E. S. Yakovleva (2000):
Teleportation of entangled states and dense coding using a multiparticle quantum channel.
Technical Report.
Available at http://arxiv.org/abs/quant-ph/0011124.
A. M. Hillebrand (2011):
Quantum Protocols involving Multiparticle Entanglement and their Representationsłinebreak in the ZX-calculus.
University of Oxford.
Available at http://www.cs.ox.ac.uk/people/bob.coecke/Anne.pdf.
H. Imai, J. Mueller-Quade, A. C. A. Nascimento, P. Tuyls & A. Winter (2003):
A Quantum Information Theoretical Model for Quantum Secret Sharing Schemes.
ArXiv Quantum Physics e-prints.
Available at http://arxiv.org/abs/quant-ph/0311136.
T. Jennewein, C. Simon, G. Weihs, H. Weinfurter & A. Zeilinger (2000):
Quantum Cryptography with Entangled Photons.
Physical Review Letters 84(20),
pp. 4729–4732,
doi:10.1103/PhysRevLett.84.4729.
J. Joo, J. Lee, J. Jang & Y.-J. Park (2002):
Quantum secure Communication via W states.
ArXiv Quantum Physics e-prints.
Available at http://arxiv.org/abs/quant-ph/0204003.
A. Kissinger (2009):
Exploring a Quantum Theory with Graph Rewriting and Computer Algebra.
In: J. Carette, L. Dixon, C. Coen & S. Watt: Intelligent Computer Mathematics,
Lecture Notes in Computer Science 5625.
Springer Berlin / Heidelberg,
pp. 90–105,
doi:10.1007/978-3-642-02614-0_12.
H.-K. Lo, X. Ma & K. Chen (2005):
Decoy State Quantum Key Distribution.
Physical Review Letters 94(23),
doi:10.1103/PhysRevLett.94.230504.
A. Nascimento, J. Mueller-Quade & H. Ima (2001):
Improving quantum secret-sharing schemes.
Physical Review A 64,
doi:10.1103/PhysRevA.64.042311.
R. Penrose (1971):
Application of negative dimensional tensors..
Combinatorial Mathematics and its Applications,
pp. 221–244..
Available at http://www.math.uic.edu/~kauffman/Penrose.pdf.