These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

266 related articles for article (PubMed ID: 24008848)

  • 1. Experimental quantum key distribution with finite-key security analysis for noisy channels.
    Bacco D; Canale M; Laurenti N; Vallone G; Villoresi P
    Nat Commun; 2013; 4():2363. PubMed ID: 24008848
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Finite-key analysis for measurement-device-independent quantum key distribution.
    Curty M; Xu F; Cui W; Lim CC; Tamaki K; Lo HK
    Nat Commun; 2014 Apr; 5():3732. PubMed ID: 24776959
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded.
    Vergoossen T; Bedington R; Grieve JA; Ling A
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267101
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Fast and simple high-capacity quantum cryptography with error detection.
    Lai H; Luo MX; Pieprzyk J; Zhang J; Pan L; Li S; Orgun MA
    Sci Rep; 2017 Apr; 7():46302. PubMed ID: 28406240
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Experimental eavesdropping based on optimal quantum cloning.
    Bartkiewicz K; Lemr K; Cernoch A; Soubusta J; Miranowicz A
    Phys Rev Lett; 2013 Apr; 110(17):173601. PubMed ID: 23679725
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Quantum-locked key distribution at nearly the classical capacity rate.
    Lupo C; Lloyd S
    Phys Rev Lett; 2014 Oct; 113(16):160502. PubMed ID: 25361242
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
    Pirandola S; Braunstein SL; Lloyd S
    Phys Rev Lett; 2008 Nov; 101(20):200504. PubMed ID: 19113324
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Private entanglement over arbitrary distances, even using noisy apparatus.
    Aschauer H; Briegel HJ
    Phys Rev Lett; 2002 Jan; 88(4):047902. PubMed ID: 11801170
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
    Scarani V; Renner R
    Phys Rev Lett; 2008 May; 100(20):200501. PubMed ID: 18518517
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.
    Yin HL; Cao WF; Fu Y; Tang YL; Liu Y; Chen TY; Chen ZB
    Opt Lett; 2014 Sep; 39(18):5451-4. PubMed ID: 26466295
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum key distribution with two-qubit quantum codes.
    Wang XB
    Phys Rev Lett; 2004 Feb; 92(7):077902. PubMed ID: 14995888
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Secure quantum key distribution using continuous variables of single photons.
    Zhang L; Silberhorn C; Walmsley IA
    Phys Rev Lett; 2008 Mar; 100(11):110504. PubMed ID: 18517770
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.
    Furrer F; Franz T; Berta M; Leverrier A; Scholz VB; Tomamichel M; Werner RF
    Phys Rev Lett; 2012 Sep; 109(10):100502. PubMed ID: 23005270
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Experimental realization of equiangular three-state quantum key distribution.
    Schiavon M; Vallone G; Villoresi P
    Sci Rep; 2016 Jul; 6():30089. PubMed ID: 27465643
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Security bounds for continuous variables quantum key distribution.
    Navascués M; Acín A
    Phys Rev Lett; 2005 Jan; 94(2):020505. PubMed ID: 15698158
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimental demonstration of subcarrier multiplexed quantum key distribution system.
    Mora J; Ruiz-Alba A; Amaya W; Martínez A; García-Muñoz V; Calvo D; Capmany J
    Opt Lett; 2012 Jun; 37(11):2031-3. PubMed ID: 22660111
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
    Grosshans F; Cerf NJ
    Phys Rev Lett; 2004 Jan; 92(4):047905. PubMed ID: 14995411
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Entanglement-based quantum key distribution with biased basis choice via free space.
    Cao Y; Liang H; Yin J; Yong HL; Zhou F; Wu YP; Ren JG; Li YH; Pan GS; Yang T; Ma X; Peng CZ; Pan JW
    Opt Express; 2013 Nov; 21(22):27260-8. PubMed ID: 24216948
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Device-independent security of quantum cryptography against collective attacks.
    Acín A; Brunner N; Gisin N; Massar S; Pironio S; Scarani V
    Phys Rev Lett; 2007 Jun; 98(23):230501. PubMed ID: 17677888
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 14.