Artykuły w czasopismach na temat „Eavesdropping on the graph state”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Eavesdropping on the graph state”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Stuart, Jeffrey L. "The eavesdropping number of a graph." Czechoslovak Mathematical Journal 59, no. 3 (2009): 623–36. http://dx.doi.org/10.1007/s10587-009-0056-9.
Pełny tekst źródłaSerhiienko, S. P., V. G. Krizhanovski, D. V. Chernov, and L. V. Zagoruiko. "The use of non-steady state noise interferences to counteract passive eavesdropping devices." Radiotekhnika, no. 207 (December 24, 2021): 132–38. http://dx.doi.org/10.30837/rt.2021.4.207.14.
Pełny tekst źródłaNaik, D. S., C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat. "Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol." Physical Review Letters 84, no. 20 (2000): 4733–36. http://dx.doi.org/10.1103/physrevlett.84.4733.
Pełny tekst źródłaYI, XIAO-JIE, JIAN-MIN WANG, and GUO-QIANG HUANG. "SPLITTING QUANTUM INFORMATION WITH FIVE-ATOM ENTANGLED STATE IN CAVITY QED." International Journal of Quantum Information 08, no. 08 (2010): 1289–99. http://dx.doi.org/10.1142/s0219749911007071.
Pełny tekst źródłaWANG, JIAN, SHENG ZHANG, QUAN ZHANG, and CHAO-JING TANG. "SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE." International Journal of Quantum Information 10, no. 05 (2012): 1250050. http://dx.doi.org/10.1142/s0219749912500505.
Pełny tekst źródłaLiu Jing-Feng, Tang Zhi-Lie, Liang Rui-Sheng, et al. "Eavesdropping on practical QKD system based on six-state protocol." Acta Physica Sinica 54, no. 2 (2005): 517. http://dx.doi.org/10.7498/aps.54.517.
Pełny tekst źródłaCirac, J. I., and N. Gisin. "Coherent eavesdropping strategies for the four state quantum cryptography protocol." Physics Letters A 229, no. 1 (1997): 1–7. http://dx.doi.org/10.1016/s0375-9601(97)00176-x.
Pełny tekst źródłaCHEN, XIU-BO, TIAN-YIN WANG, JIAN-ZHONG DU, QIAO-YAN WEN, and FU-CHEN ZHU. "CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION." International Journal of Quantum Information 06, no. 03 (2008): 543–51. http://dx.doi.org/10.1142/s0219749908003566.
Pełny tekst źródłaZaidi, Ali Mustafa, and David Greaves. "Value State Flow Graph." ACM Transactions on Reconfigurable Technology and Systems 9, no. 2 (2016): 1–22. http://dx.doi.org/10.1145/2807702.
Pełny tekst źródłaBouajjani, A., J. C. Fernandez, N. Halbwachs, P. Raymond, and C. Ratel. "Minimal state graph generation." Science of Computer Programming 18, no. 3 (1992): 247–69. http://dx.doi.org/10.1016/0167-6423(92)90018-7.
Pełny tekst źródłaChen, Guihong, Xi Liu, Mohammad Shorfuzzaman, Ali Karime, Yonghua Wang, and Yuanhang Qi. "MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs." ACM Transactions on Internet Technology 22, no. 3 (2022): 1–17. http://dx.doi.org/10.1145/3453186.
Pełny tekst źródłaPeng, Yue Hong, Jia Wang Li, Jin Hao Liu, and Yu Min Liu. "Influence of Path Attacks on Security of Six-State Scheme." Applied Mechanics and Materials 263-266 (December 2012): 3114–19. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3114.
Pełny tekst źródłaBechmann-Pasquinucci, H., and N. Gisin. "Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography." Physical Review A 59, no. 6 (1999): 4238–48. http://dx.doi.org/10.1103/physreva.59.4238.
Pełny tekst źródłaHao, Yuan, Liu Yin-Min, Zhang Wen, and Zhang Zhan-Jun. "Eavesdropping on Quantum Secure Direct Communication with W State in Noisy Channel." Communications in Theoretical Physics 49, no. 1 (2008): 103–6. http://dx.doi.org/10.1088/0253-6102/49/1/22.
Pełny tekst źródłaSHADMAN, Z., H. KAMPERMANN, T. MEYER, and D. BRUß. "OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 07, no. 01 (2009): 297–306. http://dx.doi.org/10.1142/s0219749909004554.
Pełny tekst źródłaQin, Huawang, Wallace K. S. Tang, and Raylin Tso. "Three-party quantum secret sharing based on d-dimensional Bell state." Modern Physics Letters B 33, no. 03 (2019): 1950023. http://dx.doi.org/10.1142/s0217984919500234.
Pełny tekst źródłaBenjamin, Simon C., Daniel E. Browne, Joe Fitzsimons, and John J. L. Morton. "Brokered graph-state quantum computation." New Journal of Physics 8, no. 8 (2006): 141. http://dx.doi.org/10.1088/1367-2630/8/8/141.
Pełny tekst źródłaAntonio, B., D. Markham, and J. Anders. "Adiabatic graph-state quantum computation." New Journal of Physics 16, no. 11 (2014): 113070. http://dx.doi.org/10.1088/1367-2630/16/11/113070.
Pełny tekst źródłaKalampakas, Antonios. "Graph Automata and Graph Colorability." European Journal of Pure and Applied Mathematics 16, no. 1 (2023): 112–20. http://dx.doi.org/10.29020/nybg.ejpam.v16i1.4629.
Pełny tekst źródłaFahmi, A. "New approach to quantum key distribution via quantum encryption." Quantum Information and Computation 9, no. 9&10 (2009): 879–98. http://dx.doi.org/10.26421/qic9.9-10-9.
Pełny tekst źródłaWang, Le, Xianghui Cao, Heng Zhang, Changyin Sun, and Wei Xing Zheng. "Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation." Automatica 137 (March 2022): 110145. http://dx.doi.org/10.1016/j.automatica.2021.110145.
Pełny tekst źródłaCardoso-Isidoro, C., and F. Delgado. "Quantum Authentication Using Double Teleportation." Journal of Physics: Conference Series 2448, no. 1 (2023): 012018. http://dx.doi.org/10.1088/1742-6596/2448/1/012018.
Pełny tekst źródłaZawadzki, Piotr, and Jarosław Adam Miszczak. "A General Scheme for Information Interception in the Ping-Pong Protocol." Advances in Mathematical Physics 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/3162012.
Pełny tekst źródłaHwang, Yongsoo, and Jun Heo. "On the relation between a graph code and a graph state." Quantum Information and Computation 16, no. 3&4 (2016): 237–50. http://dx.doi.org/10.26421/qic16.3-4-3.
Pełny tekst źródłaPIRANDOLA, STEFANO. "SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, supp01 (2008): 765–71. http://dx.doi.org/10.1142/s0219749908004080.
Pełny tekst źródłaLiao, Longxia, Xiaoqi Peng, Jinjing Shi, and Ying Guo. "Graph state-based quantum authentication scheme." International Journal of Modern Physics B 31, no. 09 (2017): 1750067. http://dx.doi.org/10.1142/s0217979217500679.
Pełny tekst źródłaKatayama, H., and A. Ichikawa. "Pole assignment by state transition graph." IEEE Transactions on Automatic Control 37, no. 8 (1992): 1196–201. http://dx.doi.org/10.1109/9.151103.
Pełny tekst źródłaKauffman, Louis H. "A state calculus for graph coloring." Illinois Journal of Mathematics 60, no. 1 (2016): 251–71. http://dx.doi.org/10.1215/ijm/1498032032.
Pełny tekst źródłaMarzuola, Jeremy L., and Dmitry E. Pelinovsky. "Ground State on the Dumbbell Graph." Applied Mathematics Research eXpress 2016, no. 1 (2016): 98–145. http://dx.doi.org/10.1093/amrx/abv011.
Pełny tekst źródłaLi, Yipeng, Xiaogang Liu, and Shenggui Zhang. "Laplacian state transfer in Q-graph." Applied Mathematics and Computation 384 (November 2020): 125370. http://dx.doi.org/10.1016/j.amc.2020.125370.
Pełny tekst źródłaSandhir, Radha Pyari. "State-independent quantum key distribution with two-way classical communication." Quantum Information and Computation 19, no. 15&16 (2019): 1279–93. http://dx.doi.org/10.26421/qic19.15-16-2.
Pełny tekst źródłaACÍN, ANTONIO, NICOLAS GISIN, LLUIS MASANES, and VALERIO SCARANI. "BELL'S INEQUALITIES DETECT EFFICIENT ENTANGLEMENT." International Journal of Quantum Information 02, no. 01 (2004): 23–31. http://dx.doi.org/10.1142/s0219749904000043.
Pełny tekst źródłaCai, Deng, and Wai Lam. "Graph Transformer for Graph-to-Sequence Learning." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (2020): 7464–71. http://dx.doi.org/10.1609/aaai.v34i05.6243.
Pełny tekst źródłaLiu, Chenghua, Zhuolin Liao, Yixuan Ma, and Kun Zhan. "Stationary Diffusion State Neural Estimation for Multiview Clustering." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 7 (2022): 7542–49. http://dx.doi.org/10.1609/aaai.v36i7.20719.
Pełny tekst źródłaYang, Chunxin, Ryan P. Scott, David J. Geisler, Nicolas K. Fontaine, Jonathan P. Heritage, and S. J. Ben Yoo. "Four-State Data Encoding for Enhanced Security Against Upstream Eavesdropping in SPECTS O-CDMA." Journal of Lightwave Technology 29, no. 1 (2011): 62–68. http://dx.doi.org/10.1109/jlt.2010.2090129.
Pełny tekst źródłaAdcock, Jeremy C., Sam Morley-Short, Axel Dahlberg, and Joshua W. Silverstone. "Mapping graph state orbits under local complementation." Quantum 4 (August 7, 2020): 305. http://dx.doi.org/10.22331/q-2020-08-07-305.
Pełny tekst źródłaANGELES-CANUL, RICARDO JAVIER, RACHAEL M. NORTON, MICHAEL C. OPPERMAN, CHRISTOPHER C. PARIBELLO, MATTHEW C. RUSSELL, and CHRISTINO TAMON. "QUANTUM PERFECT STATE TRANSFER ON WEIGHTED JOIN GRAPHS." International Journal of Quantum Information 07, no. 08 (2009): 1429–45. http://dx.doi.org/10.1142/s0219749909006103.
Pełny tekst źródłaBechmann-Pasquinucci, H., and N. Gisin. "Bell inequality for quNits with binary measurements." Quantum Information and Computation 3, no. 2 (2003): 157–64. http://dx.doi.org/10.26421/qic3.2-6.
Pełny tekst źródłaQian, Pengzhi, Yu Zhang, Xiaojuan Yan, Yong Chen, and Yifu Sun. "A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT." Electronics 12, no. 11 (2023): 2507. http://dx.doi.org/10.3390/electronics12112507.
Pełny tekst źródłaCoutinho, Gabriel, and Chris Godsil. "Perfect state transfer is poly-time." Quantum Information and Computation 17, no. 5&6 (2017): 495–502. http://dx.doi.org/10.26421/qic17.5-6-8.
Pełny tekst źródłaKAWASAKI, Yosuke, and Masaki TAKAHASHI. "World state dependent action graph based on knowledge representation using scene graph." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2022 (2022): 1A1—T08. http://dx.doi.org/10.1299/jsmermd.2022.1a1-t08.
Pełny tekst źródłaBrown, John, Chris Godsil, Devlin Mallory, Abigail Raz, and Christino Tamon. "Perfect state transfer on signed graphs." Quantum Information and Computation 13, no. 5&6 (2013): 511–30. http://dx.doi.org/10.26421/qic13.5-6-10.
Pełny tekst źródłaLi, Jian, HaiFei Jin, and Bo Jing. "Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol." Chinese Science Bulletin 57, no. 34 (2012): 4434–41. http://dx.doi.org/10.1007/s11434-012-5516-1.
Pełny tekst źródłaLi, Jian, Hai-Fei Jin, and Bo Jing. "Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on Five-Particle Cluster State." International Journal of Theoretical Physics 51, no. 9 (2012): 2759–70. http://dx.doi.org/10.1007/s10773-012-1151-5.
Pełny tekst źródłaLiao, Longxia, Xiaoqi Peng, Jinjing Shi, and Ying Guo. "Graph State-Based Quantum Group Authentication Scheme." Journal of the Physical Society of Japan 86, no. 2 (2017): 024403. http://dx.doi.org/10.7566/jpsj.86.024403.
Pełny tekst źródłaHerrera-Marti, David A., and Terry Rudolph. "Loss tolerance with a concatenated graph state." Quantum Information and Computation 13, no. 11&12 (2013): 995–1006. http://dx.doi.org/10.26421/qic13.11-12-6.
Pełny tekst źródłaHajdušek, M., and M. Murao. "Direct evaluation of pure graph state entanglement." New Journal of Physics 15, no. 1 (2013): 013039. http://dx.doi.org/10.1088/1367-2630/15/1/013039.
Pełny tekst źródłaTian, Yu-Ling, Tian-Feng Feng, and Xiao-Qi Zhou. "Collaborative quantum computation with redundant graph state." Acta Physica Sinica 68, no. 11 (2019): 110302. http://dx.doi.org/10.7498/aps.68.20190142.
Pełny tekst źródłaZambon, Eduardo, and Arend Rensink. "Graph Subsumption in Abstract State Space Exploration." Electronic Proceedings in Theoretical Computer Science 99 (October 23, 2012): 35–49. http://dx.doi.org/10.4204/eptcs.99.6.
Pełny tekst źródłaKaur, Hargeet, and Atul Kumar. "An Improved Ping-Pong Protocol Using Three-Qubit Nonmaximally Nonorthogonal Entangled States." Zeitschrift für Naturforschung A 74, no. 9 (2019): 799–811. http://dx.doi.org/10.1515/zna-2018-0448.
Pełny tekst źródła