BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

164 related articles for article (PubMed ID: 27383014)

  • 1. Security of quantum key distribution with multiphoton components.
    Yin HL; Fu Y; Mao Y; Chen ZB
    Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol.
    Mizutani A; Tamaki K; Ikuta R; Yamamoto T; Imoto N
    Sci Rep; 2014 Jun; 4():5236. PubMed ID: 24913431
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quantum Authentication Evolution: Novel Approaches for Securing Quantum Key Distribution.
    Termos H
    Entropy (Basel); 2024 May; 26(6):. PubMed ID: 38920455
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Experimental quantum key distribution with decoy states.
    Zhao Y; Qi B; Ma X; Lo HK; Qian L
    Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067
    [TBL] [Abstract][Full Text] [Related]  

  • 7. High-rate intercity quantum key distribution with a semiconductor single-photon source.
    Yang J; Jiang Z; Benthin F; Hanel J; Fandrich T; Joos R; Bauer S; Kolatschek S; Hreibi A; Rugeramigabo EP; Jetter M; Portalupi SL; Zopf M; Michler P; Kück S; Ding F
    Light Sci Appl; 2024 Jul; 13(1):150. PubMed ID: 38956020
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security of six-state quantum key distribution protocol with threshold detectors.
    Kato G; Tamaki K
    Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing.
    Chen X; Chen L; Yan Y
    Entropy (Basel); 2022 Sep; 24(9):. PubMed ID: 36141118
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Invisible Trojan-horse attack.
    Sajeed S; Minshull C; Jain N; Makarov V
    Sci Rep; 2017 Aug; 7(1):8403. PubMed ID: 28827553
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Unconditional security of single-photon differential phase shift quantum key distribution.
    Wen K; Tamaki K; Yamamoto Y
    Phys Rev Lett; 2009 Oct; 103(17):170503. PubMed ID: 19905739
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Qubit-Based Clock Synchronization for QKD Systems Using a Bayesian Approach.
    Cochran RD; Gauthier DJ
    Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441128
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Plug-and-play round-robin differential phase-shift quantum key distribution.
    Mao QP; Wang L; Zhao SM
    Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Measurement-device-independent quantum key distribution with modified coherent state.
    Li M; Zhang CM; Yin ZQ; Chen W; Wang S; Guo GC; Han ZF
    Opt Lett; 2014 Feb; 39(4):880-3. PubMed ID: 24562231
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Phase-Matching Quantum Key Distribution with Discrete Phase Randomization.
    Zhang X; Wang Y; Jiang M; Lu Y; Li H; Zhou C; Bao W
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922572
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Unconditional security of a three state quantum key distribution protocol.
    Boileau JC; Tamaki K; Batuwantudawe J; Laflamme R; Renes JM
    Phys Rev Lett; 2005 Feb; 94(4):040503. PubMed ID: 15783540
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.