These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

157 related articles for article (PubMed ID: 17375143)

  • 1. Secure quantum key distribution with a single not-so-weak coherent pulse.
    Kim CM; Kim YW; Park YJ
    Opt Lett; 2007 Apr; 32(8):888-90. PubMed ID: 17375143
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Measurement-device-independent quantum key distribution with modified coherent state.
    Li M; Zhang CM; Yin ZQ; Chen W; Wang S; Guo GC; Han ZF
    Opt Lett; 2014 Feb; 39(4):880-3. PubMed ID: 24562231
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Phase Matching Quantum Key Distribution based on Single-Photon Entanglement.
    Li W; Wang L; Zhao S
    Sci Rep; 2019 Oct; 9(1):15466. PubMed ID: 31664069
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Quantum key distribution with blind polarization bases.
    Kye WH; Kim CM; Kim MS; Park YJ
    Phys Rev Lett; 2005 Jul; 95(4):040501. PubMed ID: 16090787
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Security of quantum key distribution with multiphoton components.
    Yin HL; Fu Y; Mao Y; Chen ZB
    Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Unconditional security of single-photon differential phase shift quantum key distribution.
    Wen K; Tamaki K; Yamamoto Y
    Phys Rev Lett; 2009 Oct; 103(17):170503. PubMed ID: 19905739
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.
    Yin HL; Cao WF; Fu Y; Tang YL; Liu Y; Chen TY; Chen ZB
    Opt Lett; 2014 Sep; 39(18):5451-4. PubMed ID: 26466295
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Simple security proof of coherent-one-way quantum key distribution.
    Gao RQ; Xie YM; Gu J; Liu WB; Weng CX; Li BH; Yin HL; Chen ZB
    Opt Express; 2022 Jun; 30(13):23783-23795. PubMed ID: 36225053
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing.
    Chen X; Chen L; Yan Y
    Entropy (Basel); 2022 Sep; 24(9):. PubMed ID: 36141118
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Practical quantum key distribution protocol without monitoring signal disturbance.
    Sasaki T; Yamamoto Y; Koashi M
    Nature; 2014 May; 509(7501):475-8. PubMed ID: 24848060
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Satellite-to-ground quantum key distribution.
    Liao SK; Cai WQ; Liu WY; Zhang L; Li Y; Ren JG; Yin J; Shen Q; Cao Y; Li ZP; Li FZ; Chen XW; Sun LH; Jia JJ; Wu JC; Jiang XJ; Wang JF; Huang YM; Wang Q; Zhou YL; Deng L; Xi T; Ma L; Hu T; Zhang Q; Chen YA; Liu NL; Wang XB; Zhu ZC; Lu CY; Shu R; Peng CZ; Wang JY; Pan JW
    Nature; 2017 Sep; 549(7670):43-47. PubMed ID: 28825707
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum key distribution with hacking countermeasures and long term field trial.
    Dixon AR; Dynes JF; Lucamarini M; Fröhlich B; Sharpe AW; Plews A; Tam W; Yuan ZL; Tanizawa Y; Sato H; Kawamura S; Fujiwara M; Sasaki M; Shields AJ
    Sci Rep; 2017 May; 7(1):1978. PubMed ID: 28512308
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security evaluation of quantum key distribution with weak basis-choice flaws.
    Sun SH; Tian ZY; Zhao MS; Ma Y
    Sci Rep; 2020 Oct; 10(1):18145. PubMed ID: 33097761
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Provably secure and high-rate quantum key distribution with time-bin qudits.
    Islam NT; Lim CCW; Cahall C; Kim J; Gauthier DJ
    Sci Adv; 2017 Nov; 3(11):e1701491. PubMed ID: 29202028
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Covert Quantum Communication.
    Arrazola JM; Scarani V
    Phys Rev Lett; 2016 Dec; 117(25):250503. PubMed ID: 28036222
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Quantum communication with coherent states of light.
    Khan I; Elser D; Dirmeier T; Marquardt C; Leuchs G
    Philos Trans A Math Phys Eng Sci; 2017 Aug; 375(2099):. PubMed ID: 28652491
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse.
    Koashi M
    Phys Rev Lett; 2004 Sep; 93(12):120501. PubMed ID: 15447243
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.
    Wang Q; Chen W; Xavier G; Swillo M; Zhang T; Sauge S; Tengner M; Han ZF; Guo GC; Karlsson A
    Phys Rev Lett; 2008 Mar; 100(9):090501. PubMed ID: 18352685
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.