A quantum access network
暂无分享,去创建一个
James F. Dynes | Marco Lucamarini | Andrew W. Sharpe | Andrew J. Shields | Zhiliang Yuan | Bernd Fröhlich | Marco Lucamarini | J. Dynes | A. Sharpe | A. Shields | Zhiliang Yuan | B. Fröhlich
[1] Raymond Thorson Newell,et al. Network-Centric Quantum Communications , 2013 .
[2] October I. Physical Review Letters , 2022 .
[3] Sellami Ali,et al. DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .
[4] Jane E. Nordholt,et al. Network-Centric Quantum Communications with Application to Critical Infrastructure Protection , 2013, ArXiv.
[5] Kathy P. Wheeler,et al. Reviews of Modern Physics , 2013 .
[6] Christoph Pacher,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[7] Renato Renner,et al. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.
[8] Renato Renner,et al. Security Bounds for Quantum Cryptography with Finite Resources , 2008, TQC.
[9] Richard J. Hughes,et al. Optical networking for quantum key distribution and quantum communications , 2009 .
[10] David P. DiVincenzo,et al. Quantum information and computation , 2000, Nature.
[11] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[12] A. R. Dixon,et al. Gigahertz quantum key distribution with InGaAs avalanche photodiodes , 2008 .
[13] L. Zhang,et al. Direct and full-scale experimental verifications towards ground–satellite quantum key distribution , 2012, 1210.7556.
[14] H. Lo,et al. Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.
[15] Tamar Frankel. [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.
[16] J. Koenderink. Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.
[17] A R Dixon,et al. Continuous operation of high bit rate quantum key distribution , 2010, 1005.4573.
[18] Xiang‐Bin Wang,et al. Beating the PNS attack in practical quantum cryptography , 2004 .
[19] R. Rosenfeld. Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[20] Masahito Hayashi. Erratum: Upper bounds of eavesdropper's performances in finite-length code with the decoy method [Phys. Rev. A 76, 012329 (2007)] , 2009 .
[21] Chip Elliott,et al. Current status of the DARPA quantum network (Invited Paper) , 2005, SPIE Defense + Commercial Sensing.
[22] Physical Review , 1965, Nature.
[23] Kai Chen,et al. Metropolitan all-pass and inter-city quantum communication network. , 2010, Optics express.
[24] M. Curty,et al. Measurement-device-independent quantum key distribution. , 2011, Physical review letters.
[25] Richard J. Hughes,et al. Experimental investigation of quantum key distribution through transparent optical switch elements , 2003, IEEE Photonics Technology Letters.
[26] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[27] A. W. Sharpe,et al. Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber , 2012, 1212.0033.
[28] A R Dixon,et al. Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.
[29] James F. Dynes,et al. Practical treatment of quantum bugs , 2012, Optics/Photonics in Security and Defence.
[30] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[31] S. M. Barnett,et al. Securing a quantum key distribution relay network using secret sharing , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).
[32] Paul D. Townsend,et al. Quantum cryptography on multiuser optical fibre networks , 1997, Nature.
[33] Tao Zhang,et al. Field test of wavelength-saving quantum key distribution network. , 2010, Optics letters.
[34] A. Shields,et al. Focus on Quantum Cryptography: Theory and Practice , 2009 .
[35] H. Weinfurter,et al. Entanglement-based quantum communication over 144km , 2007 .
[36] M. Hayashi. Upper bounds of eavesdropper’s performances in finite-length code with the decoy method , 2007, quant-ph/0702250.
[37] A. W. Sharpe,et al. High speed single photon detection in the near-infrared , 2007, 0707.4307.
[38] H. Weinfurter,et al. Free-Space distribution of entanglement and single photons over 144 km , 2006, quant-ph/0607182.
[39] Valerio Scarani,et al. Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.
[40] Benjamin Göhler,et al. Electro-Optical Remote Sensing, Photonic Technologies, and Applications IV , 2011 .
[41] H. Weinfurter,et al. Air-to-ground quantum communication , 2013, Nature Photonics.