4.4.2 The PGM in action
Course subject(s)
04. From imperfect information to (near) perfect security
We review a simple example application of the PGM introduced in the previous video.
![Creative Commons License](https://i.creativecommons.org/l/by-nc-sa/4.0/88x31.png)
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.