These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

241 related articles for article (PubMed ID: 28789196)

  • 1. Finite-key bound for semi-device-independent quantum key distribution.
    Zhou C; Xu P; Bao WS; Wang Y; Zhang Y; Jiang MS; Li HW
    Opt Express; 2017 Jul; 25(15):16971-16980. PubMed ID: 28789196
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Secrecy in Prepare-and-Measure Clauser-Horne-Shimony-Holt Tests with a Qubit Bound.
    Woodhead E; Pironio S
    Phys Rev Lett; 2015 Oct; 115(15):150501. PubMed ID: 26550712
    [TBL] [Abstract][Full Text] [Related]  

  • 3. On the security of semi-device-independent QKD protocols.
    Chaturvedi A; Ray M; Veynar R; Pawłowski M
    Quantum Inf Process; 2018; 17(6):131. PubMed ID: 31007638
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution.
    Wang C; Song XT; Yin ZQ; Wang S; Chen W; Zhang CM; Guo GC; Han ZF
    Phys Rev Lett; 2015 Oct; 115(16):160502. PubMed ID: 26550855
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness.
    Jiang XL; Wang Y; Lu YF; Li JJ; Zhou C; Bao WS
    Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420359
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Toward a Photonic Demonstration of Device-Independent Quantum Key Distribution.
    Liu WZ; Zhang YZ; Zhen YZ; Li MH; Liu Y; Fan J; Xu F; Zhang Q; Pan JW
    Phys Rev Lett; 2022 Jul; 129(5):050502. PubMed ID: 35960585
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Quantum key distribution with prepare-and-measure Bell test.
    Tan YG
    Sci Rep; 2016 Oct; 6():35032. PubMed ID: 27733771
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states.
    Lee D; Hong S; Cho YW; Lim HT; Han SW; Jung H; Moon S; Lee KJ; Kim YS
    Opt Lett; 2020 May; 45(9):2624-2627. PubMed ID: 32356832
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Measurement-Device-Independent Twin-Field Quantum Key Distribution.
    Yin HL; Fu Y
    Sci Rep; 2019 Feb; 9(1):3045. PubMed ID: 30816262
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security of Semi-Device-Independent Random Number Expansion Protocols.
    Li DD; Wen QY; Wang YK; Zhou YQ; Gao F
    Sci Rep; 2015 Oct; 5():15543. PubMed ID: 26503335
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
    Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources.
    Gu J; Cao XY; Fu Y; He ZW; Yin ZJ; Yin HL; Chen ZB
    Sci Bull (Beijing); 2022 Nov; 67(21):2167-2175. PubMed ID: 36545992
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.
    Mao CC; Zhou XY; Zhu JR; Zhang CH; Zhang CM; Wang Q
    Opt Express; 2018 May; 26(10):13289-13300. PubMed ID: 29801354
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security Analysis of Quantum Key Distribution with Small Block Length and Its Application to Quantum Space Communications.
    Lim CC; Xu F; Pan JW; Ekert A
    Phys Rev Lett; 2021 Mar; 126(10):100501. PubMed ID: 33784137
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Security of six-state quantum key distribution protocol with threshold detectors.
    Kato G; Tamaki K
    Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition.
    Wang RQ; Yin ZQ; Lu FY; Wang R; Wang S; Chen W; Huang W; Xu BJ; Guo GC; Han ZF
    Opt Express; 2020 Jul; 28(15):22594-22605. PubMed ID: 32752517
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Feasible attack on detector-device-independent quantum key distribution.
    Wei K; Liu H; Ma H; Yang X; Zhang Y; Sun Y; Xiao J; Ji Y
    Sci Rep; 2017 Mar; 7(1):449. PubMed ID: 28348408
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 13.