BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

320 related articles for article (PubMed ID: 29133835)

  • 1. Plug-and-play round-robin differential phase-shift quantum key distribution.
    Mao QP; Wang L; Zhao SM
    Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method.
    Liu L; Guo FZ; Qin SJ; Wen QY
    Sci Rep; 2017 Feb; 7():42261. PubMed ID: 28198808
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Round-robin-differential-phase-shift quantum key distribution with monitoring signal disturbance.
    Wang R; Yin ZQ; Wang S; Chen W; Guo GC; Han ZF
    Opt Lett; 2018 Sep; 43(17):4228-4231. PubMed ID: 30160758
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Experimental passive round-robin differential phase-shift quantum key distribution.
    Guan JY; Cao Z; Liu Y; Shen-Tu GL; Pelc JS; Fejer MM; Peng CZ; Ma X; Zhang Q; Pan JW
    Phys Rev Lett; 2015 May; 114(18):180502. PubMed ID: 26000991
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Afterpulse effects in quantum key distribution without monitoring signal disturbance.
    Liu H; Yin ZQ; Wang ZH; Shan YG; Wang S; Chen W; Dong C; Guo GC; Han ZF
    Opt Lett; 2023 Apr; 48(7):1558-1561. PubMed ID: 37221709
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Practical round-robin differential phase-shift quantum key distribution.
    Zhang YY; Bao WS; Zhou C; Li HW; Wang Y; Jiang MS
    Opt Express; 2016 Sep; 24(18):20763-73. PubMed ID: 27607679
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Finite-key analysis for round-robin-differential-phase-shift quantum key distribution.
    Liu H; Yin ZQ; Wang R; Lu FY; Wang S; Chen W; Huang W; Xu BJ; Guo GC; Han ZF
    Opt Express; 2020 May; 28(10):15416-15423. PubMed ID: 32403569
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Improved security bound for the round-robin-differential-phase-shift quantum key distribution.
    Yin ZQ; Wang S; Chen W; Han YG; Wang R; Guo GC; Han ZF
    Nat Commun; 2018 Jan; 9(1):457. PubMed ID: 29386505
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.
    Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q
    Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Measurement-device-independent quantum key distribution with leaky sources.
    Wang W; Tamaki K; Curty M
    Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Measurement-Device-Independent Twin-Field Quantum Key Distribution.
    Yin HL; Fu Y
    Sci Rep; 2019 Feb; 9(1):3045. PubMed ID: 30816262
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimental quantum-key distribution with an untrusted source.
    Peng X; Jiang H; Xu B; Ma X; Guo H
    Opt Lett; 2008 Sep; 33(18):2077-9. PubMed ID: 18794936
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method.
    Xue K; Shen Z; Zhao S; Mao Q
    Entropy (Basel); 2022 May; 24(5):. PubMed ID: 35626547
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 16.