These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

159 related articles for article (PubMed ID: 37998210)

  • 21. Controlling an actively-quenched single photon detector with bright light.
    Sauge S; Lydersen L; Anisimov A; Skaar J; Makarov V
    Opt Express; 2011 Nov; 19(23):23590-600. PubMed ID: 22109239
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.
    Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q
    Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Effects of experimental impairments on the security of continuous-variable quantum key distribution.
    Ruiz-Chamorro A; Cano D; Garcia-Callejo A; Fernandez V
    Heliyon; 2023 Jun; 9(6):e16670. PubMed ID: 37303546
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Security of quantum key distribution from generalised entropy accumulation.
    Metger T; Renner R
    Nat Commun; 2023 Aug; 14(1):5272. PubMed ID: 37644010
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Free space quantum key distribution using modulating retro-reflectors.
    Rabinovich WS; Mahon R; Ferraro MS; Goetz PG; Bashkansky M; Freeman RE; Reintjes J; Murphy JL
    Opt Express; 2018 Apr; 26(9):11331-11351. PubMed ID: 29716056
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Characteristics of superconducting single photon detector in DPS-QKD system under bright illumination blinding attack.
    Fujiwara M; Honjo T; Shimizu K; Tamaki K; Sasaki M
    Opt Express; 2013 Mar; 21(5):6304-12. PubMed ID: 23482199
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Security of six-state quantum key distribution protocol with threshold detectors.
    Kato G; Tamaki K
    Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Device-Independent Quantum Key Distribution with Random Postselection.
    Xu F; Zhang YZ; Zhang Q; Pan JW
    Phys Rev Lett; 2022 Mar; 128(11):110506. PubMed ID: 35363036
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Provably secure and high-rate quantum key distribution with time-bin qudits.
    Islam NT; Lim CCW; Cahall C; Kim J; Gauthier DJ
    Sci Adv; 2017 Nov; 3(11):e1701491. PubMed ID: 29202028
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect.
    Xu S; Li Y; Wang Y; Mao Y; Wu X; Guo Y
    Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946004
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.
    Adu-Kyere A; Nigussie E; Isoaho J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016045
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Plug-and-play round-robin differential phase-shift quantum key distribution.
    Mao QP; Wang L; Zhao SM
    Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Short Review on Quantum Key Distribution Protocols.
    Giampouris D
    Adv Exp Med Biol; 2017; 988():149-157. PubMed ID: 28971396
    [TBL] [Abstract][Full Text] [Related]  

  • 36. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
    Pavičić M
    Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573044
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states.
    Lee D; Hong S; Cho YW; Lim HT; Han SW; Jung H; Moon S; Lee KJ; Kim YS
    Opt Lett; 2020 May; 45(9):2624-2627. PubMed ID: 32356832
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Fully Passive Quantum Key Distribution.
    Wang W; Wang R; Hu C; Zapatero V; Qian L; Qi B; Curty M; Lo HK
    Phys Rev Lett; 2023 Jun; 130(22):220801. PubMed ID: 37327415
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Weak randomness impacts the security of reference-frame-independent quantum key distribution.
    Zhang CM; Wang WB; Li HW; Wang Q
    Opt Lett; 2019 Mar; 44(5):1226-1229. PubMed ID: 30821754
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method.
    Xue K; Shen Z; Zhao S; Mao Q
    Entropy (Basel); 2022 May; 24(5):. PubMed ID: 35626547
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.