These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 37644010)

  • 41. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 42. FL-QKD based on optical-THz biphotons generated by spontaneous parametric downconversion in inter-satellite wireless communication.
    Liu CJ; Zhu CH; Nie M; Yang H; Pei CX
    Appl Opt; 2021 Aug; 60(24):7362-7370. PubMed ID: 34613025
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution.
    Liu ZP; Zhou MG; Liu WB; Li CL; Gu J; Yin HL; Chen ZB
    Opt Express; 2022 Apr; 30(9):15024-15036. PubMed ID: 35473234
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Unconditional security of single-photon differential phase shift quantum key distribution.
    Wen K; Tamaki K; Yamamoto Y
    Phys Rev Lett; 2009 Oct; 103(17):170503. PubMed ID: 19905739
    [TBL] [Abstract][Full Text] [Related]  

  • 46. Simple security proof of coherent-one-way quantum key distribution.
    Gao RQ; Xie YM; Gu J; Liu WB; Weng CX; Li BH; Yin HL; Chen ZB
    Opt Express; 2022 Jun; 30(13):23783-23795. PubMed ID: 36225053
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.
    Yu S; Lee J; Lee K; Park K; Park Y
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30248898
    [TBL] [Abstract][Full Text] [Related]  

  • 48. Measurement-device-independent quantum key distribution with leaky sources.
    Wang W; Tamaki K; Curty M
    Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254
    [TBL] [Abstract][Full Text] [Related]  

  • 49. Feasible attack on detector-device-independent quantum key distribution.
    Wei K; Liu H; Ma H; Yang X; Zhang Y; Sun Y; Xiao J; Ji Y
    Sci Rep; 2017 Mar; 7(1):449. PubMed ID: 28348408
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Parallel Device-Independent Quantum Key Distribution.
    Jain R; Miller CA; Shi Y
    IEEE Trans Inf Theory; 2020; 66(9):. PubMed ID: 33654327
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Experimental demonstration on the deterministic quantum key distribution based on entangled photons.
    Chen H; Zhou ZY; Zangana AJ; Yin ZQ; Wu J; Han YG; Wang S; Li HW; He DY; Tawfeeq SK; Shi BS; Guo GC; Chen W; Han ZF
    Sci Rep; 2016 Feb; 6():20962. PubMed ID: 26860582
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Generalised Entropy Accumulation.
    Metger T; Fawzi O; Sutter D; Renner R
    Commun Math Phys; 2024; 405(11):261. PubMed ID: 39403569
    [TBL] [Abstract][Full Text] [Related]  

  • 53. Quantum key distribution with correlated sources.
    Pereira M; Kato G; Mizutani A; Curty M; Tamaki K
    Sci Adv; 2020 Sep; 6(37):. PubMed ID: 32917693
    [TBL] [Abstract][Full Text] [Related]  

  • 54. From Bell's theorem to secure quantum key distribution.
    Acín A; Gisin N; Masanes L
    Phys Rev Lett; 2006 Sep; 97(12):120405. PubMed ID: 17025944
    [TBL] [Abstract][Full Text] [Related]  

  • 55. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 56. One-sided device-independent quantum key distribution for two independent parties.
    Xin J; Lu XM; Li X; Li G
    Opt Express; 2020 Apr; 28(8):11439-11450. PubMed ID: 32403655
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.
    Nam J; Choo KK; Paik J; Won D
    ScientificWorldJournal; 2014; 2014():802359. PubMed ID: 25309956
    [TBL] [Abstract][Full Text] [Related]  

  • 58. QKD Based on Symmetric Entangled Bernstein-Vazirani.
    Ampatzis M; Andronikos T
    Entropy (Basel); 2021 Jul; 23(7):. PubMed ID: 34356411
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Higher-rate relativistic quantum key distribution.
    Bebrov G
    Sci Rep; 2021 Dec; 11(1):23543. PubMed ID: 34876616
    [TBL] [Abstract][Full Text] [Related]  

  • 60. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.
    Zhang Z; Mower J; Englund D; Wong FN; Shapiro JH
    Phys Rev Lett; 2014 Mar; 112(12):120506. PubMed ID: 24724641
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.