These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
3. Physical Unclonable Function based on a Multi-Mode Optical Waveguide. Mesaritakis C; Akriotou M; Kapsalis A; Grivas E; Chaintoutis C; Nikas T; Syvridis D Sci Rep; 2018 Jun; 8(1):9653. PubMed ID: 29941976 [TBL] [Abstract][Full Text] [Related]
4. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels. Nellore V; Xi S; Dwyer C ACS Nano; 2015 Dec; 9(12):11840-8. PubMed ID: 26525314 [TBL] [Abstract][Full Text] [Related]
6. Experimental demonstration of ghost-imaging-based authentication in scattering media. Xiao Y; Zhou L; Chen W Opt Express; 2019 Jul; 27(15):20558-20566. PubMed ID: 31510147 [TBL] [Abstract][Full Text] [Related]
7. Initial tamper tests of novel tamper-indicating optical physical unclonable functions. Anderson BR; Gunawidjaja R; Eilers H Appl Opt; 2017 Apr; 56(10):2863-2872. PubMed ID: 28375254 [TBL] [Abstract][Full Text] [Related]
8. Versatile and Validated Optical Authentication System Based on Physical Unclonable Functions. Arppe-Tabbara R; Tabbara M; Sørensen TJ ACS Appl Mater Interfaces; 2019 Feb; 11(6):6475-6482. PubMed ID: 30648843 [TBL] [Abstract][Full Text] [Related]
9. Revisiting silk: a lens-free optical physical unclonable function. Kim MS; Lee GJ; Leem JW; Choi S; Kim YL; Song YM Nat Commun; 2022 Jan; 13(1):247. PubMed ID: 35017474 [TBL] [Abstract][Full Text] [Related]
10. Quantum communication with coherent states of light. Khan I; Elser D; Dirmeier T; Marquardt C; Leuchs G Philos Trans A Math Phys Eng Sci; 2017 Aug; 375(2099):. PubMed ID: 28652491 [TBL] [Abstract][Full Text] [Related]
11. An optical authentication system based on imaging of excitation-selected lanthanide luminescence. Carro-Temboury MR; Arppe R; Vosch T; Sørensen TJ Sci Adv; 2018 Jan; 4(1):e1701384. PubMed ID: 29387788 [TBL] [Abstract][Full Text] [Related]
12. Observing optical coherence across Fock layers with weak-field homodyne detectors. Donati G; Bartley TJ; Jin XM; Vidrighin MD; Datta A; Barbieri M; Walmsley IA Nat Commun; 2014 Nov; 5():5584. PubMed ID: 25427457 [TBL] [Abstract][Full Text] [Related]
13. Witnessing effective entanglement over a 2 km fiber channel. Wittmann C; Fürst J; Wiechers C; Elser D; Häseler H; Lütkenhaus N; Leuchs G Opt Express; 2010 Mar; 18(5):4499-509. PubMed ID: 20389462 [TBL] [Abstract][Full Text] [Related]
14. An optical encryption and authentication scheme using asymmetric keys. Rajput SK; Nishchal NK J Opt Soc Am A Opt Image Sci Vis; 2014 Jun; 31(6):1233-8. PubMed ID: 24977361 [TBL] [Abstract][Full Text] [Related]
18. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Bian Y; Huang L; Zhang Y Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33673729 [TBL] [Abstract][Full Text] [Related]
19. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Chen H; Ge L; Xie L Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224 [TBL] [Abstract][Full Text] [Related]