These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

216 related articles for article (PubMed ID: 18518263)

  • 1. Structured codes improve the Bennett-Brassard-84 quantum key rate.
    Smith G; Renes JM; Smolin JA
    Phys Rev Lett; 2008 May; 100(17):170502. PubMed ID: 18518263
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Experimental passive round-robin differential phase-shift quantum key distribution.
    Guan JY; Cao Z; Liu Y; Shen-Tu GL; Pelc JS; Fejer MM; Peng CZ; Ma X; Zhang Q; Pan JW
    Phys Rev Lett; 2015 May; 114(18):180502. PubMed ID: 26000991
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Unconditional security of a three state quantum key distribution protocol.
    Boileau JC; Tamaki K; Batuwantudawe J; Laflamme R; Renes JM
    Phys Rev Lett; 2005 Feb; 94(4):040503. PubMed ID: 15783540
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication.
    Kraus B; Gisin N; Renner R
    Phys Rev Lett; 2005 Aug; 95(8):080501. PubMed ID: 16196841
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
    Scarani V; Renner R
    Phys Rev Lett; 2008 May; 100(20):200501. PubMed ID: 18518517
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Unconditional security of single-photon differential phase shift quantum key distribution.
    Wen K; Tamaki K; Yamamoto Y
    Phys Rev Lett; 2009 Oct; 103(17):170503. PubMed ID: 19905739
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Simple proof of security of the BB84 quantum key distribution protocol.
    Shor PW; Preskill J
    Phys Rev Lett; 2000 Jul; 85(2):441-4. PubMed ID: 10991303
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator.
    Korzh B; Walenta N; Houlmann R; Zbinden H
    Opt Express; 2013 Aug; 21(17):19579-92. PubMed ID: 24105505
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Practical quantum key distribution protocol without monitoring signal disturbance.
    Sasaki T; Yamamoto Y; Koashi M
    Nature; 2014 May; 509(7501):475-8. PubMed ID: 24848060
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.
    Wang Q; Chen W; Xavier G; Swillo M; Zhang T; Sauge S; Tengner M; Han ZF; Guo GC; Karlsson A
    Phys Rev Lett; 2008 Mar; 100(9):090501. PubMed ID: 18352685
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol.
    Wei CY; Gao F; Wen QY; Wang TY
    Sci Rep; 2014 Dec; 4():7537. PubMed ID: 25518810
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Experimental quantum key distribution with decoy states.
    Zhao Y; Qi B; Ma X; Lo HK; Qian L
    Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.
    Kon WY; Lim CCW
    Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396236
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Efficient Routing Protocol for Quantum Key Distribution Networks.
    Yao J; Wang Y; Li Q; Mao H; El-Latif AAA; Chen N
    Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885133
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km.
    Schmitt-Manderbach T; Weier H; Fürst M; Ursin R; Tiefenbacher F; Scheidl T; Perdigues J; Sodnik Z; Kurtsiefer C; Rarity JG; Zeilinger A; Weinfurter H
    Phys Rev Lett; 2007 Jan; 98(1):010504. PubMed ID: 17358463
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Employing covert communications-based information reconciliation and multiple spatial modes to polarization entanglement QKD.
    Gariano J; Djordjevic IB
    Opt Lett; 2019 Feb; 44(3):687-690. PubMed ID: 30702711
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Experimental realization of equiangular three-state quantum key distribution.
    Schiavon M; Vallone G; Villoresi P
    Sci Rep; 2016 Jul; 6():30089. PubMed ID: 27465643
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Secure quantum key distribution with an uncharacterized source.
    Koashi M; Preskill J
    Phys Rev Lett; 2003 Feb; 90(5):057902. PubMed ID: 12633399
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber.
    Yin HL; Chen TY; Yu ZW; Liu H; You LX; Zhou YH; Chen SJ; Mao Y; Huang MQ; Zhang WJ; Chen H; Li MJ; Nolan D; Zhou F; Jiang X; Wang Z; Zhang Q; Wang XB; Pan JW
    Phys Rev Lett; 2016 Nov; 117(19):190501. PubMed ID: 27858431
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.