BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

154 related articles for article (PubMed ID: 37998248)

  • 1. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources.
    Gu J; Cao XY; Fu Y; He ZW; Yin ZJ; Yin HL; Chen ZB
    Sci Bull (Beijing); 2022 Nov; 67(21):2167-2175. PubMed ID: 36545992
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.
    Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q
    Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Review of Security Evaluation of Practical Quantum Key Distribution System.
    Sun S; Huang A
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
    Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security evaluation of quantum key distribution with weak basis-choice flaws.
    Sun SH; Tian ZY; Zhao MS; Ma Y
    Sci Rep; 2020 Oct; 10(1):18145. PubMed ID: 33097761
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure BB84-type quantum key distribution with a simple phase error formula.
    Yin HL; Chen ZB
    Opt Lett; 2020 Apr; 45(7):1627-1630. PubMed ID: 32235959
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Plug-and-play round-robin differential phase-shift quantum key distribution.
    Mao QP; Wang L; Zhao SM
    Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution.
    Roberts GL; Pittaluga M; Minder M; Lucamarini M; Dynes JF; Yuan ZL; Shields AJ
    Opt Lett; 2018 Oct; 43(20):5110-5113. PubMed ID: 30320832
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security of quantum key distribution with multiphoton components.
    Yin HL; Fu Y; Mao Y; Chen ZB
    Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Proof-of-Principle Demonstration of Fully Passive Quantum Key Distribution.
    Hu C; Wang W; Chan KS; Yuan Z; Lo HK
    Phys Rev Lett; 2023 Sep; 131(11):110801. PubMed ID: 37774309
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security of six-state quantum key distribution protocol with threshold detectors.
    Kato G; Tamaki K
    Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Hacking on decoy-state quantum key distribution system with partial phase randomization.
    Sun SH; Jiang MS; Ma XC; Li CY; Liang LM
    Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Randomness determines practical security of BB84 quantum key distribution.
    Li HW; Yin ZQ; Wang S; Qian YJ; Chen W; Guo GC; Han ZF
    Sci Rep; 2015 Nov; 5():16200. PubMed ID: 26552359
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.