These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

142 related articles for article (PubMed ID: 28374854)

  • 1. Efficient multiuser quantum cryptography network based on entanglement.
    Xue P; Wang K; Wang X
    Sci Rep; 2017 Apr; 7():45928. PubMed ID: 28374854
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Simple proof of security of the BB84 quantum key distribution protocol.
    Shor PW; Preskill J
    Phys Rev Lett; 2000 Jul; 85(2):441-4. PubMed ID: 10991303
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quantum cryptographic resource distillation and entanglement.
    Choi M; Lee S
    Sci Rep; 2021 Oct; 11(1):21095. PubMed ID: 34702893
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Private entanglement over arbitrary distances, even using noisy apparatus.
    Aschauer H; Briegel HJ
    Phys Rev Lett; 2002 Jan; 88(4):047902. PubMed ID: 11801170
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Quantum cryptography with perfect multiphoton entanglement.
    Luo Y; Chan KT
    J Opt Soc Am A Opt Image Sci Vis; 2005 May; 22(5):1003-6. PubMed ID: 15898562
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Efficient entanglement distillation without quantum memory.
    Abdelkhalek D; Syllwasschy M; Cerf NJ; Fiurášek J; Schnabel R
    Nat Commun; 2016 May; 7():11720. PubMed ID: 27241946
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
    Bruss D; Christandl M; Ekert A; Englert BG; Kaszlikowski D; Macchiavello C
    Phys Rev Lett; 2003 Aug; 91(9):097901. PubMed ID: 14525209
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Fully device-independent quantum key distribution.
    Vazirani U; Vidick T
    Phys Rev Lett; 2014 Oct; 113(14):140501. PubMed ID: 25325625
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
    Chen H; Ge L; Xie L
    Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum cryptography with entangled photons.
    Jennewein T; Simon C; Weihs G; Weinfurter H; Zeilinger A
    Phys Rev Lett; 2000 May; 84(20):4729-32. PubMed ID: 10990782
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Experimental realization of an entanglement access network and secure multi-party computation.
    Chang XY; Deng DL; Yuan XX; Hou PY; Huang YY; Duan LM
    Sci Rep; 2016 Jul; 6():29453. PubMed ID: 27404561
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum Cryptanalysis on a Multivariate Cryptosystem Based on Clipped Hopfield Neural Network.
    Dai S
    IEEE Trans Neural Netw Learn Syst; 2022 Sep; 33(9):5080-5084. PubMed ID: 33646959
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A simple quantum voting scheme with multi-qubit entanglement.
    Xue P; Zhang X
    Sci Rep; 2017 Aug; 7(1):7586. PubMed ID: 28790430
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Entanglement purification for quantum communication.
    Pan JW; Simon C; Brukner C; Zeilinger A
    Nature; 2001 Apr; 410(6832):1067-70. PubMed ID: 11323664
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Multiuser Time-Energy Entanglement Swapping Based on Dense Wavelength Division Multiplexed and Sum-Frequency Generation.
    Li Y; Huang Y; Xiang T; Nie Y; Sang M; Yuan L; Chen X
    Phys Rev Lett; 2019 Dec; 123(25):250505. PubMed ID: 31922812
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secure quantum key distribution using continuous variables of single photons.
    Zhang L; Silberhorn C; Walmsley IA
    Phys Rev Lett; 2008 Mar; 100(11):110504. PubMed ID: 18517770
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimental purification of two-atom entanglement.
    Reichle R; Leibfried D; Knill E; Britton J; Blakestad RB; Jost JD; Langer C; Ozeri R; Seidelin S; Wineland DJ
    Nature; 2006 Oct; 443(7113):838-41. PubMed ID: 17051214
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.
    Shi J; Chen S; Lu Y; Feng Y; Shi R; Yang Y; Li J
    Sci Rep; 2020 Feb; 10(1):2107. PubMed ID: 32034194
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Experimental entanglement distillation and 'hidden' non-locality.
    Kwiat PG; Barraza-Lopez S; Stefanov A; Gisin N
    Nature; 2001 Feb; 409(6823):1014-7. PubMed ID: 11234004
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Unconditionally secure commitment in position-based quantum cryptography.
    Nadeem M
    Sci Rep; 2014 Oct; 4():6774. PubMed ID: 25346509
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.