These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
185 related articles for article (PubMed ID: 29497080)
1. Quantum Secure Group Communication. Li ZH; Zubairy MS; Al-Amri M Sci Rep; 2018 Mar; 8(1):3899. PubMed ID: 29497080 [TBL] [Abstract][Full Text] [Related]
2. Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Fei YY; Meng XD; Gao M; Wang H; Ma Z Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828 [TBL] [Abstract][Full Text] [Related]
3. Security analysis of quantum key distribution on passive optical networks. Lim K; Ko H; Suh C; Rhee JK Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747 [TBL] [Abstract][Full Text] [Related]
4. Counterfactual quantum key distribution with untrusted detectors. Lin YQ; Wang M; Yang XQ; Liu HW Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753 [TBL] [Abstract][Full Text] [Related]
5. Deterministic Secure Quantum Communication on the BB84 System. Jeong YC; Ji SW; Hong C; Park HS; Jang J Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287036 [TBL] [Abstract][Full Text] [Related]
6. Deterministic secure quantum communication using a single d-level system. Jiang D; Chen Y; Gu X; Xie L; Chen L Sci Rep; 2017 Mar; 7():44934. PubMed ID: 28327557 [TBL] [Abstract][Full Text] [Related]
7. Exchange unknown quantum states with almost invisible photons. Wang L; Li ZH; Xu J; Yang Y; Al-Amri M; Zubairy MS Opt Express; 2019 Jul; 27(15):20525-20540. PubMed ID: 31510145 [TBL] [Abstract][Full Text] [Related]
8. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Pavičić M Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573044 [TBL] [Abstract][Full Text] [Related]
9. Controlled bidirectional quantum secure direct communication. Chou YH; Lin YT; Zeng GJ; Lin FJ; Chen CY ScientificWorldJournal; 2014; 2014():694798. PubMed ID: 25006596 [TBL] [Abstract][Full Text] [Related]
11. Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station. Stipčević M Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998210 [TBL] [Abstract][Full Text] [Related]
12. Quantum Multi-User Broadcast Protocol for the "Platform as a Service" Model. Shi P; Li N; Wang S; Liu Z; Ren M; Ma H Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31795386 [TBL] [Abstract][Full Text] [Related]
13. Quantum Diffie-Hellman Extended to Dynamic Quantum Group Key Agreement for e-Healthcare Multi-Agent Systems in Smart Cities. Naresh VS; Nasralla MM; Reddi S; García-Magariño I Sensors (Basel); 2020 Jul; 20(14):. PubMed ID: 32679823 [TBL] [Abstract][Full Text] [Related]
14. Simple proof of security of the BB84 quantum key distribution protocol. Shor PW; Preskill J Phys Rev Lett; 2000 Jul; 85(2):441-4. PubMed ID: 10991303 [TBL] [Abstract][Full Text] [Related]
15. Quantum private set intersection cardinality based on bloom filter. Liu B; Ruan O; Shi R; Zhang M Sci Rep; 2021 Aug; 11(1):17332. PubMed ID: 34462472 [TBL] [Abstract][Full Text] [Related]
16. High-dimensional single photon based quantum secure direct communication using time and phase mode degrees. Ahn B; Park J; Lee J; Lee S Sci Rep; 2024 Jan; 14(1):888. PubMed ID: 38195695 [TBL] [Abstract][Full Text] [Related]
17. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Adu-Kyere A; Nigussie E; Isoaho J Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016045 [TBL] [Abstract][Full Text] [Related]
18. Quantum cryptography with entangled photons. Jennewein T; Simon C; Weihs G; Weinfurter H; Zeilinger A Phys Rev Lett; 2000 May; 84(20):4729-32. PubMed ID: 10990782 [TBL] [Abstract][Full Text] [Related]
19. Efficient room-temperature molecular single-photon sources for quantum key distribution. Murtaza G; Colautti M; Hilke M; Lombardi P; Cataliotti FS; Zavatta A; Bacco D; Toninelli C Opt Express; 2023 Mar; 31(6):9437-9447. PubMed ID: 37157515 [TBL] [Abstract][Full Text] [Related]
20. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Rubenok A; Slater JA; Chan P; Lucio-Martinez I; Tittel W Phys Rev Lett; 2013 Sep; 111(13):130501. PubMed ID: 24116757 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]