These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

122 related articles for article (PubMed ID: 28393853)

  • 1. Continuous-variable quantum authentication of physical unclonable keys.
    Nikolopoulos GM; Diamanti E
    Sci Rep; 2017 Apr; 7():46047. PubMed ID: 28393853
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Optical scheme for cryptographic commitments with physical unclonable keys.
    Nikolopoulos GM
    Opt Express; 2019 Sep; 27(20):29367-29379. PubMed ID: 31684673
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Physical Unclonable Function based on a Multi-Mode Optical Waveguide.
    Mesaritakis C; Akriotou M; Kapsalis A; Grivas E; Chaintoutis C; Nikas T; Syvridis D
    Sci Rep; 2018 Jun; 8(1):9653. PubMed ID: 29941976
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.
    Nellore V; Xi S; Dwyer C
    ACS Nano; 2015 Dec; 9(12):11840-8. PubMed ID: 26525314
    [TBL] [Abstract][Full Text] [Related]  

  • 5. All-optical multilevel physical unclonable functions.
    Nocentini S; Rührmair U; Barni M; Wiersma DS; Riboli F
    Nat Mater; 2024 Mar; 23(3):369-376. PubMed ID: 38191630
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Experimental demonstration of ghost-imaging-based authentication in scattering media.
    Xiao Y; Zhou L; Chen W
    Opt Express; 2019 Jul; 27(15):20558-20566. PubMed ID: 31510147
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Initial tamper tests of novel tamper-indicating optical physical unclonable functions.
    Anderson BR; Gunawidjaja R; Eilers H
    Appl Opt; 2017 Apr; 56(10):2863-2872. PubMed ID: 28375254
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Versatile and Validated Optical Authentication System Based on Physical Unclonable Functions.
    Arppe-Tabbara R; Tabbara M; Sørensen TJ
    ACS Appl Mater Interfaces; 2019 Feb; 11(6):6475-6482. PubMed ID: 30648843
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Revisiting silk: a lens-free optical physical unclonable function.
    Kim MS; Lee GJ; Leem JW; Choi S; Kim YL; Song YM
    Nat Commun; 2022 Jan; 13(1):247. PubMed ID: 35017474
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum communication with coherent states of light.
    Khan I; Elser D; Dirmeier T; Marquardt C; Leuchs G
    Philos Trans A Math Phys Eng Sci; 2017 Aug; 375(2099):. PubMed ID: 28652491
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An optical authentication system based on imaging of excitation-selected lanthanide luminescence.
    Carro-Temboury MR; Arppe R; Vosch T; Sørensen TJ
    Sci Adv; 2018 Jan; 4(1):e1701384. PubMed ID: 29387788
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Observing optical coherence across Fock layers with weak-field homodyne detectors.
    Donati G; Bartley TJ; Jin XM; Vidrighin MD; Datta A; Barbieri M; Walmsley IA
    Nat Commun; 2014 Nov; 5():5584. PubMed ID: 25427457
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Witnessing effective entanglement over a 2 km fiber channel.
    Wittmann C; Fürst J; Wiechers C; Elser D; Häseler H; Lütkenhaus N; Leuchs G
    Opt Express; 2010 Mar; 18(5):4499-509. PubMed ID: 20389462
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An optical encryption and authentication scheme using asymmetric keys.
    Rajput SK; Nishchal NK
    J Opt Soc Am A Opt Image Sci Vis; 2014 Jun; 31(6):1233-8. PubMed ID: 24977361
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Meta-hologram-based authentication scheme employing a speckle pattern fingerprint.
    Blau Y; Bar-On O; Hanein Y; Boag A; Scheuer J
    Opt Express; 2020 Mar; 28(6):8924-8936. PubMed ID: 32225508
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.
    Furrer F; Franz T; Berta M; Leverrier A; Scholz VB; Tomamichel M; Werner RF
    Phys Rev Lett; 2012 Sep; 109(10):100502. PubMed ID: 23005270
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimentally feasible quantum erasure-correcting code for continuous variables.
    Niset J; Andersen UL; Cerf NJ
    Phys Rev Lett; 2008 Sep; 101(13):130503. PubMed ID: 18851428
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States.
    Bian Y; Huang L; Zhang Y
    Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33673729
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.
    Chen H; Ge L; Xie L
    Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224
    [TBL] [Abstract][Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 7.