These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

154 related articles for article (PubMed ID: 32868774)

  • 1. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.
    Yin HL; Cao WF; Fu Y; Tang YL; Liu Y; Chen TY; Chen ZB
    Opt Lett; 2014 Sep; 39(18):5451-4. PubMed ID: 26466295
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.
    Mao CC; Zhou XY; Zhu JR; Zhang CH; Zhang CM; Wang Q
    Opt Express; 2018 May; 26(10):13289-13300. PubMed ID: 29801354
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secure BB84-type quantum key distribution with a simple phase error formula.
    Yin HL; Chen ZB
    Opt Lett; 2020 Apr; 45(7):1627-1630. PubMed ID: 32235959
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security of quantum key distribution with multiphoton components.
    Yin HL; Fu Y; Mao Y; Chen ZB
    Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Finite-key analysis for twin-field quantum key distribution with composable security.
    Yin HL; Chen ZB
    Sci Rep; 2019 Nov; 9(1):17113. PubMed ID: 31745131
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.
    Song TT; Qin SJ; Wen QY; Wang YK; Jia HY
    Sci Rep; 2015 Oct; 5():15276. PubMed ID: 26471947
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
    Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.
    Chen R; Bao W; Zhou C; Li H; Wang Y; Bao H
    Opt Express; 2016 Mar; 24(6):6594-605. PubMed ID: 27136849
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition.
    Wang RQ; Yin ZQ; Lu FY; Wang R; Wang S; Chen W; Huang W; Xu BJ; Guo GC; Han ZF
    Opt Express; 2020 Jul; 28(15):22594-22605. PubMed ID: 32752517
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Review of Security Evaluation of Practical Quantum Key Distribution System.
    Sun S; Huang A
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Experimental quantum key distribution with uncharacterized sources and projective measurements.
    Zhu JR; Wu WZ; Ji L; Zhang CM; Wang Q
    Opt Lett; 2019 Dec; 44(23):5703-5706. PubMed ID: 31774758
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Short Review on Quantum Key Distribution Protocols.
    Giampouris D
    Adv Exp Med Biol; 2017; 988():149-157. PubMed ID: 28971396
    [TBL] [Abstract][Full Text] [Related]  

  • 20. High-rate intercity quantum key distribution with a semiconductor single-photon source.
    Yang J; Jiang Z; Benthin F; Hanel J; Fandrich T; Joos R; Bauer S; Kolatschek S; Hreibi A; Rugeramigabo EP; Jetter M; Portalupi SL; Zopf M; Michler P; Kück S; Ding F
    Light Sci Appl; 2024 Jul; 13(1):150. PubMed ID: 38956020
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.