These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 37644010)

  • 21. Insecurity of Detector-Device-Independent Quantum Key Distribution.
    Sajeed S; Huang A; Sun S; Xu F; Makarov V; Curty M
    Phys Rev Lett; 2016 Dec; 117(25):250505. PubMed ID: 28036200
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded.
    Vergoossen T; Bedington R; Grieve JA; Ling A
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267101
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Security Analysis of Quantum Key Distribution with Small Block Length and Its Application to Quantum Space Communications.
    Lim CC; Xu F; Pan JW; Ekert A
    Phys Rev Lett; 2021 Mar; 126(10):100501. PubMed ID: 33784137
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Finite-key bound for semi-device-independent quantum key distribution.
    Zhou C; Xu P; Bao WS; Wang Y; Zhang Y; Jiang MS; Li HW
    Opt Express; 2017 Jul; 25(15):16971-16980. PubMed ID: 28789196
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Experimental measurement-device-independent quantum digital signatures.
    Roberts GL; Lucamarini M; Yuan ZL; Dynes JF; Comandar LC; Sharpe AW; Shields AJ; Curty M; Puthoor IV; Andersson E
    Nat Commun; 2017 Oct; 8(1):1098. PubMed ID: 29061966
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.
    Miroshnichenko GP; Kozubov AV; Gaidash AA; Gleim AV; Horoshko DB
    Opt Express; 2018 Apr; 26(9):11292-11308. PubMed ID: 29716053
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect.
    Xu S; Li Y; Wang Y; Mao Y; Wu X; Guo Y
    Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946004
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Coherent-State-Based Twin-Field Quantum Key Distribution.
    Yin HL; Chen ZB
    Sci Rep; 2019 Oct; 9(1):14918. PubMed ID: 31624279
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Unconditional security of a three state quantum key distribution protocol.
    Boileau JC; Tamaki K; Batuwantudawe J; Laflamme R; Renes JM
    Phys Rev Lett; 2005 Feb; 94(4):040503. PubMed ID: 15783540
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Continuous-variable source-device-independent quantum key distribution against general attacks.
    Zhang Y; Chen Z; Weedbrook C; Yu S; Guo H
    Sci Rep; 2020 Apr; 10(1):6673. PubMed ID: 32317691
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states.
    Lee D; Hong S; Cho YW; Lim HT; Han SW; Jung H; Moon S; Lee KJ; Kim YS
    Opt Lett; 2020 May; 45(9):2624-2627. PubMed ID: 32356832
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.
    Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q
    Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Practical continuous-variable quantum key distribution with composable security.
    Jain N; Chin HM; Mani H; Lupo C; Nikolic DS; Kordts A; Pirandola S; Pedersen TB; Kolb M; Ömer B; Pacher C; Gehring T; Andersen UL
    Nat Commun; 2022 Aug; 13(1):4740. PubMed ID: 35961965
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Entanglement-based secure quantum cryptography over 1,120 kilometres.
    Yin J; Li YH; Liao SK; Yang M; Cao Y; Zhang L; Ren JG; Cai WQ; Liu WY; Li SL; Shu R; Huang YM; Deng L; Li L; Zhang Q; Liu NL; Chen YA; Lu CY; Wang XB; Xu F; Wang JY; Peng CZ; Ekert AK; Pan JW
    Nature; 2020 Jun; 582(7813):501-505. PubMed ID: 32541968
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Quantum key distribution with prepare-and-measure Bell test.
    Tan YG
    Sci Rep; 2016 Oct; 6():35032. PubMed ID: 27733771
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.
    García-Patrón R; Cerf NJ
    Phys Rev Lett; 2006 Nov; 97(19):190503. PubMed ID: 17155606
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method.
    Liu L; Guo FZ; Qin SJ; Wen QY
    Sci Rep; 2017 Feb; 7():42261. PubMed ID: 28198808
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Secrecy in Prepare-and-Measure Clauser-Horne-Shimony-Holt Tests with a Qubit Bound.
    Woodhead E; Pironio S
    Phys Rev Lett; 2015 Oct; 115(15):150501. PubMed ID: 26550712
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.