These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

190 related articles for article (PubMed ID: 35205554)

  • 1. A Review of Security Evaluation of Practical Quantum Key Distribution System.
    Sun S; Huang A
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
    Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination.
    Wu Z; Huang A; Chen H; Sun SH; Ding J; Qiang X; Fu X; Xu P; Wu J
    Opt Express; 2020 Aug; 28(17):25574-25590. PubMed ID: 32907074
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Hacking on decoy-state quantum key distribution system with partial phase randomization.
    Sun SH; Jiang MS; Ma XC; Li CY; Liang LM
    Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis.
    Zheng Y; Shi H; Pan W; Wang Q; Mao J
    Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573307
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security evaluation of quantum key distribution with weak basis-choice flaws.
    Sun SH; Tian ZY; Zhao MS; Ma Y
    Sci Rep; 2020 Oct; 10(1):18145. PubMed ID: 33097761
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station.
    Stipčević M
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998210
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness.
    Jiang XL; Wang Y; Lu YF; Li JJ; Zhou C; Bao WS
    Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420359
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Short Review on Quantum Key Distribution Protocols.
    Giampouris D
    Adv Exp Med Biol; 2017; 988():149-157. PubMed ID: 28971396
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Countermeasure for security loophole caused by asymmetric correlations of reference frame independent quantum key distribution with fewer quantum states.
    Lim K; Choi BS; Baek JH; Kim M; Choe JS; Kim KJ; Ko YH; Youn CJ
    Opt Express; 2021 Jun; 29(12):18966-18975. PubMed ID: 34154140
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Entanglement-based secure quantum cryptography over 1,120 kilometres.
    Yin J; Li YH; Liao SK; Yang M; Cao Y; Zhang L; Ren JG; Cai WQ; Liu WY; Li SL; Shu R; Huang YM; Deng L; Li L; Zhang Q; Liu NL; Chen YA; Lu CY; Wang XB; Xu F; Wang JY; Peng CZ; Ekert AK; Pan JW
    Nature; 2020 Jun; 582(7813):501-505. PubMed ID: 32541968
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states.
    Lee D; Hong S; Cho YW; Lim HT; Han SW; Jung H; Moon S; Lee KJ; Kim YS
    Opt Lett; 2020 May; 45(9):2624-2627. PubMed ID: 32356832
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method.
    Xue K; Shen Z; Zhao S; Mao Q
    Entropy (Basel); 2022 May; 24(5):. PubMed ID: 35626547
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Randomness determines practical security of BB84 quantum key distribution.
    Li HW; Yin ZQ; Wang S; Qian YJ; Chen W; Guo GC; Han ZF
    Sci Rep; 2015 Nov; 5():16200. PubMed ID: 26552359
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.