These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

256 related articles for article (PubMed ID: 33114847)

  • 1. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Finite-key analysis for twin-field quantum key distribution with composable security.
    Yin HL; Chen ZB
    Sci Rep; 2019 Nov; 9(1):17113. PubMed ID: 31745131
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.
    Mao CC; Zhou XY; Zhu JR; Zhang CH; Zhang CM; Wang Q
    Opt Express; 2018 May; 26(10):13289-13300. PubMed ID: 29801354
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Measurement-device-independent quantum key distribution with leaky sources.
    Wang W; Tamaki K; Curty M
    Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition.
    Wang RQ; Yin ZQ; Lu FY; Wang R; Wang S; Chen W; Huang W; Xu BJ; Guo GC; Han ZF
    Opt Express; 2020 Jul; 28(15):22594-22605. PubMed ID: 32752517
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure BB84-type quantum key distribution with a simple phase error formula.
    Yin HL; Chen ZB
    Opt Lett; 2020 Apr; 45(7):1627-1630. PubMed ID: 32235959
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Plug-and-play round-robin differential phase-shift quantum key distribution.
    Mao QP; Wang L; Zhao SM
    Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Experimental quantum key distribution with decoy states.
    Zhao Y; Qi B; Ma X; Lo HK; Qian L
    Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.
    Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q
    Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
    Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.
    Chen R; Bao W; Zhou C; Li H; Wang Y; Bao H
    Opt Express; 2016 Mar; 24(6):6594-605. PubMed ID: 27136849
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security of quantum key distribution with multiphoton components.
    Yin HL; Fu Y; Mao Y; Chen ZB
    Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method.
    Liu L; Guo FZ; Qin SJ; Wen QY
    Sci Rep; 2017 Feb; 7():42261. PubMed ID: 28198808
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Decoy-state quantum key distribution with polarized photons over 200 km.
    Liu Y; Chen TY; Wang J; Cai WQ; Wan X; Chen LK; Wang JH; Liu SB; Liang H; Yang L; Peng CZ; Chen K; Chen ZB; Pan JW
    Opt Express; 2010 Apr; 18(8):8587-94. PubMed ID: 20588703
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 13.