-
41
On the QKD Integration in Converged Fiber/Wireless Topologies for Secured, Low-Latency 5G/B5G Fronthaul
Published 2020-07-01Subjects: Get full text
Article -
42
-
43
-
44
-
45
Managing patients with an absent or dysfunctional spleen. Is there evidence to show that daily antibiotic treatment is best?
Published 1996Journal article -
46
-
47
The role of transmural ventricular heterogeneities in cardiac vulnerability to electric shocks
Published 2008Journal article -
48
-
49
Simulation of Bennet and Brassard 84 protocol with Eve's attacks
Published 2014“…A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. …”
Get full text
Conference or Workshop Item -
50
After Charlie Gard: ethically ensuring access to innovative treatment
Published 2017Journal article -
51
Altered CD45 expression in C77G carriers influences immune function and outcome of hepatitis C infection
Published 2006Journal article -
52
Maternal diet during pregnancy and childhood bone mass at age 9 years: A longitudinal study
Published 2007Conference item -
53
Paraneoplastic cerebellar degeneration and antibodies to P/Q-type calcium channels [3] (multiple letters)
Published 2003Journal article -
54
The H+H2O -> OH+H-2 reaction: OH state-resolved differential cross-sections and H-2 internal energy disposals
Published 1997Journal article -
55
Practical quantum key distribution
Published 2012“…We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
Get full text
Book Chapter -
56
Estimation of decoy state parameters for practical QKD
Published 2011“…We have presented a method to estimate parameters of the decoy state method based on one decoy state protocol for both BB84 and SARG04. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
Get full text
Article -
57
Using evidence about clinical effectiveness in everyday psychiatric practice
Published 1997Journal article -
58
-
59
-
60
Alternative discrete variable protocol for point to point Quantum Key Distribution system
Published 2012“…The SARG04 is more robust against photon number splitting attacks and double the BB84 critical transmission distance. Nevertheless SARG04 protocol still has lower percentage of sifted key bit compared to BB84 protocol. …”
Get full text
Thesis