These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

151 related articles for article (PubMed ID: 37998248)

  • 1. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources.
    Gu J; Cao XY; Fu Y; He ZW; Yin ZJ; Yin HL; Chen ZB
    Sci Bull (Beijing); 2022 Nov; 67(21):2167-2175. PubMed ID: 36545992
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss.
    Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q
    Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Review of Security Evaluation of Practical Quantum Key Distribution System.
    Sun S; Huang A
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
    Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security evaluation of quantum key distribution with weak basis-choice flaws.
    Sun SH; Tian ZY; Zhao MS; Ma Y
    Sci Rep; 2020 Oct; 10(1):18145. PubMed ID: 33097761
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure BB84-type quantum key distribution with a simple phase error formula.
    Yin HL; Chen ZB
    Opt Lett; 2020 Apr; 45(7):1627-1630. PubMed ID: 32235959
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Plug-and-play round-robin differential phase-shift quantum key distribution.
    Mao QP; Wang L; Zhao SM
    Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Experimental underwater quantum key distribution.
    Feng Z; Li S; Xu Z
    Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution.
    Roberts GL; Pittaluga M; Minder M; Lucamarini M; Dynes JF; Yuan ZL; Shields AJ
    Opt Lett; 2018 Oct; 43(20):5110-5113. PubMed ID: 30320832
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security of quantum key distribution with multiphoton components.
    Yin HL; Fu Y; Mao Y; Chen ZB
    Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Proof-of-Principle Demonstration of Fully Passive Quantum Key Distribution.
    Hu C; Wang W; Chan KS; Yuan Z; Lo HK
    Phys Rev Lett; 2023 Sep; 131(11):110801. PubMed ID: 37774309
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security of six-state quantum key distribution protocol with threshold detectors.
    Kato G; Tamaki K
    Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Hacking on decoy-state quantum key distribution system with partial phase randomization.
    Sun SH; Jiang MS; Ma XC; Li CY; Liang LM
    Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Randomness determines practical security of BB84 quantum key distribution.
    Li HW; Yin ZQ; Wang S; Qian YJ; Chen W; Guo GC; Han ZF
    Sci Rep; 2015 Nov; 5():16200. PubMed ID: 26552359
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.