These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

162 related articles for article (PubMed ID: 27661950)

  • 1. Detector-decoy high-dimensional quantum key distribution.
    Bao H; Bao W; Wang Y; Chen R; Zhou C; Jiang M; Li H
    Opt Express; 2016 Sep; 24(19):22159-68. PubMed ID: 27661950
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.
    Wang Q; Chen W; Xavier G; Swillo M; Zhang T; Sauge S; Tengner M; Han ZF; Guo GC; Karlsson A
    Phys Rev Lett; 2008 Mar; 100(9):090501. PubMed ID: 18352685
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.
    Zhang Z; Mower J; Englund D; Wong FN; Shapiro JH
    Phys Rev Lett; 2014 Mar; 112(12):120506. PubMed ID: 24724641
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Practical round-robin differential phase-shift quantum key distribution.
    Zhang YY; Bao WS; Zhou C; Li HW; Wang Y; Jiang MS
    Opt Express; 2016 Sep; 24(18):20763-73. PubMed ID: 27607679
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Experimental long-distance decoy-state quantum key distribution based on polarization encoding.
    Peng CZ; Zhang J; Yang D; Gao WB; Ma HX; Yin H; Zeng HP; Yang T; Wang XB; Pan JW
    Phys Rev Lett; 2007 Jan; 98(1):010505. PubMed ID: 17358464
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution.
    Wang D; Li M; Guo GC; Wang Q
    Sci Rep; 2015 Oct; 5():15130. PubMed ID: 26463580
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Long-distance decoy-state quantum key distribution in optical fiber.
    Rosenberg D; Harrington JW; Rice PR; Hiskett PA; Peterson CG; Hughes RJ; Lita AE; Nam SW; Nordholt JE
    Phys Rev Lett; 2007 Jan; 98(1):010503. PubMed ID: 17358462
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Simple and efficient quantum key distribution with parametric down-conversion.
    Adachi Y; Yamamoto T; Koashi M; Imoto N
    Phys Rev Lett; 2007 Nov; 99(18):180503. PubMed ID: 17995389
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Decoy-state phase-matching quantum key distribution with source errors.
    Yu Y; Wang L; Zhao S; Mao Q
    Opt Express; 2021 Jan; 29(2):2227-2243. PubMed ID: 33726422
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Experimental quantum key distribution with decoy states.
    Zhao Y; Qi B; Ma X; Lo HK; Qian L
    Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.
    Chen R; Bao W; Zhou C; Li H; Wang Y; Bao H
    Opt Express; 2016 Mar; 24(6):6594-605. PubMed ID: 27136849
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Experimental measurement-device-independent quantum key distribution.
    Liu Y; Chen TY; Wang LJ; Liang H; Shentu GL; Wang J; Cui K; Yin HL; Liu NL; Li L; Ma X; Pelc JS; Fejer MM; Peng CZ; Zhang Q; Pan JW
    Phys Rev Lett; 2013 Sep; 111(13):130502. PubMed ID: 24116758
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Security of six-state quantum key distribution protocol with threshold detectors.
    Kato G; Tamaki K
    Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.
    Tang Z; Liao Z; Xu F; Qi B; Qian L; Lo HK
    Phys Rev Lett; 2014 May; 112(19):190503. PubMed ID: 24877922
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.
    Mao CC; Zhou XY; Zhu JR; Zhang CH; Zhang CM; Wang Q
    Opt Express; 2018 May; 26(10):13289-13300. PubMed ID: 29801354
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.