BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

264 related articles for article (PubMed ID: 30320832)

  • 1. Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution.
    Roberts GL; Pittaluga M; Minder M; Lucamarini M; Dynes JF; Yuan ZL; Shields AJ
    Opt Lett; 2018 Oct; 43(20):5110-5113. PubMed ID: 30320832
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Suppression of patterning effect using IQ modulator for high-speed quantum key distribution systems.
    Gao Y; Yuan Z
    Opt Lett; 2023 Feb; 48(4):1068-1071. PubMed ID: 36791012
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
    Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.
    Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q
    Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686
    [TBL] [Abstract][Full Text] [Related]  

  • 6. All-fiber self-compensating polarization encoder for quantum key distribution.
    Agnesi C; Avesani M; Stanco A; Villoresi P; Vallone G
    Opt Lett; 2019 May; 44(10):2398-2401. PubMed ID: 31090697
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.
    Song TT; Qin SJ; Wen QY; Wang YK; Jia HY
    Sci Rep; 2015 Oct; 5():15276. PubMed ID: 26471947
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A 5 GHz and 7.5 V multi-amplitude modulator driving circuit for practical high-speed quantum key distribution.
    Liu X; Huang MQ; Min H; Jin G; Jiang X; Peng CZ
    Rev Sci Instrum; 2020 Feb; 91(2):024705. PubMed ID: 32113405
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Entanglement-based secure quantum cryptography over 1,120 kilometres.
    Yin J; Li YH; Liao SK; Yang M; Cao Y; Zhang L; Ren JG; Cai WQ; Liu WY; Li SL; Shu R; Huang YM; Deng L; Li L; Zhang Q; Liu NL; Chen YA; Lu CY; Wang XB; Xu F; Wang JY; Peng CZ; Ekert AK; Pan JW
    Nature; 2020 Jun; 582(7813):501-505. PubMed ID: 32541968
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Measurement-device-independent quantum key distribution with leaky sources.
    Wang W; Tamaki K; Curty M
    Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Experimental quantum key distribution with decoy states.
    Zhao Y; Qi B; Ma X; Lo HK; Qian L
    Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Application and Development of QKD-Based Quantum Secure Communication.
    Lai J; Yao F; Wang J; Zhang M; Li F; Zhao W; Zhang H
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190415
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Experimental quantum key distribution with uncharacterized sources and projective measurements.
    Zhu JR; Wu WZ; Ji L; Zhang CM; Wang Q
    Opt Lett; 2019 Dec; 44(23):5703-5706. PubMed ID: 31774758
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Hacking on decoy-state quantum key distribution system with partial phase randomization.
    Sun SH; Jiang MS; Ma XC; Li CY; Liang LM
    Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Experimental realization of a reference-frame-independent decoy BB84 quantum key distribution based on Sagnac interferometer.
    Li YP; Chen W; Wang FX; Yin ZQ; Zhang L; Liu H; Wang S; He DY; Zhou Z; Guo GC; Han ZF
    Opt Lett; 2019 Sep; 44(18):4523-4526. PubMed ID: 31517921
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An Efficient Routing Protocol for Quantum Key Distribution Networks.
    Yao J; Wang Y; Li Q; Mao H; El-Latif AAA; Chen N
    Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885133
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method.
    Liu L; Guo FZ; Qin SJ; Wen QY
    Sci Rep; 2017 Feb; 7():42261. PubMed ID: 28198808
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Provably secure and high-rate quantum key distribution with time-bin qudits.
    Islam NT; Lim CCW; Cahall C; Kim J; Gauthier DJ
    Sci Adv; 2017 Nov; 3(11):e1701491. PubMed ID: 29202028
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 14.