Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,061,362 papers from all fields of science
Search
Sign In
Create Free Account
Decoy state
Known as:
Decoy state protocol
, Decoy states
Decoy state quantum key distribution (QKD) protocol is the most widely implemented QKD scheme. Practical QKD systems use multi-photon sources, in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
BB84
List of quantum key distribution protocols
Quantum cryptography
Quantum key distribution
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Fundamental Insecurity of Multi-Photon Sources Under Photon-Number Splitting Attacks in Quantum Key Distribution
H. Yuen
2012
Corpus ID: 118887204
A simple photon-number splitting attack is described which works on any lossy quantum key distribution system with a multi-photon…
Expand
2011
2011
Security Analysis of Decoy-State Quantum Key Distribution System
Liu Yi-ming
2011
Corpus ID: 63788842
Decoy-state quantum key distribution system is adopted by many experiment systems,and is declared to be of ideal security by some…
Expand
2011
2011
Decoy-state quantum key distribution with practical light source
Jiao Rong-zhen
,
Zhang Chao
,
Ma Hai-qiang
2011
Corpus ID: 117593467
The performance of active decoy-state quantum key distribution (QKD) system with a practical light source is compared with that…
Expand
2010
2010
Establishing the model of κB-decoy inhibiting the activity of NF-κB in PC12 cells
Sun Yi-ping
2010
Corpus ID: 87322783
Objective:Observing the time course and establishing the model of κB-decoy oligodeoxynucleotides (κB-decoy) inhibiting the…
Expand
2007
2007
Experimental Decoy State Quantum Key Distribution Over 120 km Fibre
Zhen-Qiang Yin
,
Z. Han
,
Wei Chen
,
Fangxing Xu
,
Qing-lin Wu
,
Guang-Can Guo
2007
Corpus ID: 111000828
Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure, has become…
Expand
2007
2007
Egr-1 mediates Si02-driven transcription of membrane type I matrix metalloproteinase in macrophages
Fei Xiang 向菲
,
Ming Bai 白明
,
Yang Jin 金阳
,
Wanli Ma 马万里
,
Jianbao Xin 辛建保
Journal of Huazhong University of Science and…
2007
Corpus ID: 11695806
The up-regulation mechanism of membrane type I matrix metalloproteinase (MT1-MMP) in macrophages stimulated by silica in vitro…
Expand
2006
2006
Nonorthogonal Decoy-State Quantum Key Distribution
李靖波
,
方细明
2006
Corpus ID: 118088824
在实际的量钥匙分发(QKD ) ,因为在传播的脉搏和严重损失衬里的多光子的存在,弱协调状态处于安全的关键率和传播距离作为光子来源有限制。圈套状态方法和 thenonorthogonal…
Expand
2003
2003
Constitute the passive infrastructure in network
Liu Xin-fen
2003
Corpus ID: 167328793
Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many…
Expand
2003
2003
Apoptosis in the Ovarian Carcinoma Cell Line OVCAR 3 Necrosis Factor-related Apoptosis-inducing Ligand-induced Identification of Interleukin 8 as an Inhibitor of Tumor Updated
T. Abdollahi
,
N. Robertson
,
A. Abdollahi
,
G. Litwack
2003
Corpus ID: 14448384
Tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) is known to trigger apoptosis in many malignant cells. Whereas…
Expand
1994
1994
An Effectiveness Analysis of the Tactical Employment of Decoys
K. S. Blanks
1994
Corpus ID: 108126173
Abstract : This thesis examines the tactical employment of decoys. The Army invested $7.5M into fielding multispectral tactical…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE