These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

160 related articles for article (PubMed ID: 27383014)

  • 1. Security of quantum key distribution with multiphoton components.
    Yin HL; Fu Y; Mao Y; Chen ZB
    Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol.
    Mizutani A; Tamaki K; Ikuta R; Yamamoto T; Imoto N
    Sci Rep; 2014 Jun; 4():5236. PubMed ID: 24913431
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quantum Authentication Evolution: Novel Approaches for Securing Quantum Key Distribution.
    Termos H
    Entropy (Basel); 2024 May; 26(6):. PubMed ID: 38920455
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Experimental quantum key distribution with decoy states.
    Zhao Y; Qi B; Ma X; Lo HK; Qian L
    Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067
    [TBL] [Abstract][Full Text] [Related]  

  • 7. High-rate intercity quantum key distribution with a semiconductor single-photon source.
    Yang J; Jiang Z; Benthin F; Hanel J; Fandrich T; Joos R; Bauer S; Kolatschek S; Hreibi A; Rugeramigabo EP; Jetter M; Portalupi SL; Zopf M; Michler P; Kück S; Ding F
    Light Sci Appl; 2024 Jul; 13(1):150. PubMed ID: 38956020
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security of six-state quantum key distribution protocol with threshold detectors.
    Kato G; Tamaki K
    Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing.
    Chen X; Chen L; Yan Y
    Entropy (Basel); 2022 Sep; 24(9):. PubMed ID: 36141118
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Invisible Trojan-horse attack.
    Sajeed S; Minshull C; Jain N; Makarov V
    Sci Rep; 2017 Aug; 7(1):8403. PubMed ID: 28827553
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Unconditional security of single-photon differential phase shift quantum key distribution.
    Wen K; Tamaki K; Yamamoto Y
    Phys Rev Lett; 2009 Oct; 103(17):170503. PubMed ID: 19905739
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Qubit-Based Clock Synchronization for QKD Systems Using a Bayesian Approach.
    Cochran RD; Gauthier DJ
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441128
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Plug-and-play round-robin differential phase-shift quantum key distribution.
    Mao QP; Wang L; Zhao SM
    Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Measurement-device-independent quantum key distribution with modified coherent state.
    Li M; Zhang CM; Yin ZQ; Chen W; Wang S; Guo GC; Han ZF
    Opt Lett; 2014 Feb; 39(4):880-3. PubMed ID: 24562231
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Phase-Matching Quantum Key Distribution with Discrete Phase Randomization.
    Zhang X; Wang Y; Jiang M; Lu Y; Li H; Zhou C; Bao W
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922572
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Unconditional security of a three state quantum key distribution protocol.
    Boileau JC; Tamaki K; Batuwantudawe J; Laflamme R; Renes JM
    Phys Rev Lett; 2005 Feb; 94(4):040503. PubMed ID: 15783540
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.