These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

127 related articles for article (PubMed ID: 33573044)

  • 1. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
    Pavičić M
    Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573044
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Can Two-Way Direct Communication Protocols Be Considered Secure?
    Pavičić M
    Nanoscale Res Lett; 2017 Sep; 12(1):552. PubMed ID: 28952129
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.
    Adu-Kyere A; Nigussie E; Isoaho J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016045
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Practical quantum key distribution protocol without monitoring signal disturbance.
    Sasaki T; Yamamoto Y; Koashi M
    Nature; 2014 May; 509(7501):475-8. PubMed ID: 24848060
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station.
    Stipčević M
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998210
    [TBL] [Abstract][Full Text] [Related]  

  • 7. One-step quantum secure direct communication.
    Sheng YB; Zhou L; Long GL
    Sci Bull (Beijing); 2022 Feb; 67(4):367-374. PubMed ID: 36546088
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
    Gerhardt I; Liu Q; Lamas-Linares A; Skaar J; Kurtsiefer C; Makarov V
    Nat Commun; 2011 Jun; 2():349. PubMed ID: 21673670
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Quantum key distribution with prepare-and-measure Bell test.
    Tan YG
    Sci Rep; 2016 Oct; 6():35032. PubMed ID: 27733771
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.
    Kon WY; Lim CCW
    Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396236
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.
    Miroshnichenko GP; Kozubov AV; Gaidash AA; Gleim AV; Horoshko DB
    Opt Express; 2018 Apr; 26(9):11292-11308. PubMed ID: 29716053
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Bases selection with pseudo-random functions in BB84 scheme.
    Dervisevic E; Voznak M; Mehic M
    Heliyon; 2024 Jan; 10(1):e23578. PubMed ID: 38173502
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Quantum Secure Group Communication.
    Li ZH; Zubairy MS; Al-Amri M
    Sci Rep; 2018 Mar; 8(1):3899. PubMed ID: 29497080
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Deterministic secure quantum communication using a single d-level system.
    Jiang D; Chen Y; Gu X; Xie L; Chen L
    Sci Rep; 2017 Mar; 7():44934. PubMed ID: 28327557
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Experimental demonstration on the deterministic quantum key distribution based on entangled photons.
    Chen H; Zhou ZY; Zangana AJ; Yin ZQ; Wu J; Han YG; Wang S; Li HW; He DY; Tawfeeq SK; Shi BS; Guo GC; Chen W; Han ZF
    Sci Rep; 2016 Feb; 6():20962. PubMed ID: 26860582
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams.
    Green A; Lawrence J; Siopsis G; Peters NA; Passian A
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139664
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Eavesdropping on the "ping-pong" quantum communication protocol.
    Wójcik A
    Phys Rev Lett; 2003 Apr; 90(15):157901. PubMed ID: 12732070
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Deterministic Secure Quantum Communication on the BB84 System.
    Jeong YC; Ji SW; Hong C; Park HS; Jang J
    Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287036
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.