We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Secure communications based on sending-or-not-sending strategy

    Recently, there are various schemes of quantum secure direct communications that have been studied. Most of these protocols commit themselves to...

    Lu Liu, Bo Lu, ... Chuan Wang in Quantum Information Processing
    Article 26 July 2022
  2. Plug-and-play sending-or-not-sending twin-field quantum key distribution

    Twin-field quantum key distribution (TF-QKD) is a new extraordinary QKD protocol, which can overcome the fundamental rate-distance limit without...

    Ke Xue, Shengmei Zhao, ... Rui Xu in Quantum Information Processing
    Article 27 September 2021
  3. Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations

    Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) removes the remaining security loopholes in original TF-QKD and can tolerate...

    Yi-Fei Lu, Yang Wang, ... Wan-Su Bao in Quantum Information Processing
    Article 03 April 2021
  4. 1002 km twin-field quantum key distribution with finite-key analysis

    Quantum key distribution (QKD) holds the potential to establish secure keys over long distances. The distance of point-to-point QKD secure key...

    Yang Liu, Wei-Jun Zhang, ... Jian-Wei Pan in Quantum Frontiers
    Article Open access 24 November 2023
  5. Fast nuclear-spin gates and electrons-nuclei entanglement of neutral atoms in weak magnetic fields

    We present a novel class of Rydberg-mediated nuclear-spin entanglement in divalent atoms with global laser pulses. First, we show a fast nuclear-spin...

    **ao-Feng Shi in Frontiers of Physics
    Article 07 December 2023
  6. Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas

    The basic principle of quantum mechanics 1 guarantees the unconditional security of quantum key distribution (QKD) 2 6 at the cost of forbidding the...

    Jiu-Peng Chen, Chi Zhang, ... Jian-Wei Pan in Nature Photonics
    Article 21 June 2021
  7. Genuine quantum networks with superposed tasks and addressing

    We show how to make quantum networks, both standard and entanglement-based, genuine quantum by providing them with the possibility of handling...

    J. Miguel-Ramiro, A. Pirker, W. Dür in npj Quantum Information
    Article Open access 07 September 2021
  8. Need for Cybersecurity Solutions in IoT Systems

    People are living in the world where billions of IoT systems are connected to the Internet. They are sending and receiving data via network, and are...
    Conference paper 2022
  9. Optimized protocol for twin-field quantum key distribution

    Twin-field quantum key distribution (TF-QKD) and its variant protocols are highly attractive due to the advantage of overcoming the rate-loss limit...

    Rong Wang, Zhen-Qiang Yin, ... Zheng-Fu Han in Communications Physics
    Article Open access 28 August 2020
  10. SPD On-Line Filter: Workflow and Data Management Systems

    Abstract

    This article presents a microservice architecture and the first prototypes of the data and workflow management systems included in the “SPD...

    D. Tereschenko, E. Ponomarev, ... V. Korkhov in Physics of Particles and Nuclei
    Article 06 June 2024
  11. Investigation of the Optimal Parameters of the Distributed Fiber Microphone Circuit Based on φ-OTDR for Speech Recognition

    Abstract

    A study of the optimal parameters of a distributed fiber microphone circuit based on a laboratory setup of a phase-sensitive optical...

    M. V. Orlova, T. V. Gritsenko, ... V. E. Karasik in Instruments and Experimental Techniques
    Article 14 September 2023
  12. A QTCP/IP reference model for partially trusted-node-based quantum-key-distribution-secured optical networks

    Classical encryption protocols that are currently used to secure the internet and transmission control protocol/internet protocol (TCP/IP) protocols...

    Masoumeh Shirichian, Reza Sabbaghi-Nadooshan, ... Monireh Houshmand in Quantum Information Processing
    Article 01 March 2024
  13. A call for Indigenous partnership in the return to the Moon

    Frank Tavares, Monica Vidaurri, ... Aparna Venkatesan in Nature Astronomy
    Article 11 April 2024
  14. AI-enhanced security demand and routing management for MANETs with optical technologies

    The proliferation of Mobile Ad hoc Networks (MANETs), where nodes connect with one another to offer the required real-time entertainment services, is...

    Xuetao Jia, Donggui Huang, Na Qin in Optical and Quantum Electronics
    Article 21 December 2023
  15. Design and Implementations of Pigeon’s Away Electronic System

    The birds (pigeons) are greatest gift to mankind. Pigeons have been used for sending messages to loved ones. These birds are found living with human...

    Arjun Sharma, Rajveer Yaduvanshi, ... Amit Pandit in MAPAN
    Article 08 May 2023
  16. Surpassing the repeaterless bound with a photon-number encoded measurement-device-independent quantum key distribution protocol

    Decoherence is detrimental to quantum key distribution (QKD) over large distances. One of the proposed solutions is to use quantum repeaters, which...

    Özlem Erkılıç, Lorcán Conlon, ... Syed M. Assad in npj Quantum Information
    Article Open access 28 March 2023
  17. Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution

    In a quantum Trojan-horse attack (THA), eavesdroppers learn encoded information by injecting bright light into encoded or decoded devices of quantum...

    Zijian Li, Bingbing Zheng, ... Ke** Wei in Quantum Information Processing
    Article 29 January 2024
  18. Rational quantum secret sharing scheme based on GHZ state

    In this paper, a new rational quantum secret sharing scheme based on GHZ state is proposed. It realizes the secret sharing among n agents by encoding...

    **aodong Zhang, Lili Wang, ... Linjian Hong in Quantum Information Processing
    Article 31 January 2023
  19. Parametric Optimization on HPC Clusters with Geneva

    Many challenges of today’s science are parametric optimization problems that are extremely complex and computationally intensive to calculate. At the...

    Jonas Weßner, Rüdiger Berlich, ... Matthias F. M. Lutz in Computing and Software for Big Science
    Article Open access 21 April 2023
  20. A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment

    In this paper, a new spatiotemporal chaotic system based on Chebyshev-dynamically coupled map lattice (CDCML) is proposed. Various performance tests...

    Qi Ren, Lin Teng, ... Donghua Jiang in The European Physical Journal Plus
    Article 22 May 2023
Did you find what you were looking for? Share feedback.