Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ti.\*:(%22Quantum interference and cryptographic keys%3A novel physics and advancing technologies %28QUICK%29%22)

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 440933

  • Page / 17638
Export

Selection :

  • and

Entanglement purification with noisy apparatus can be used to factor out an eavesdropperASCHAUER, H; BRIEGEL, H. J.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 171-177, issn 1434-6060Conference Paper

Comprehensive experimental test of quantum erasureTRIFONOV, A; BJÖRK, G; SÖDERHOLM, J et al.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 251-258, issn 1434-6060Conference Paper

Testing Bell inequalities in photonic crystalsANGELAKIS, D. G; KNIGHT, P. L.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 247-250, issn 1434-6060Conference Paper

Cloning and cryptography with quantum continuous variablesCERF, N. J; IBLISDIR, S; VAN ASSCHE, G et al.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 211-218, issn 1434-6060Conference Paper

Quantum key distribution using quantum-correlated photon sourcesEDWARDS, P. J; POLLARD, G. H; CHEUNG, W. N et al.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 147-153, issn 1434-6060Conference Paper

Triggered single photons and entangled photons from a quantum dot microcavityPELTON, M; SANTORI, C; SOLOMON, G. S et al.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 179-190, issn 1434-6060Conference Paper

Solid-state single photon sources: light collection strategiesBARNES, W. L; BJÖRK, G; GERARD, J. M et al.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 197-210, issn 1434-6060Conference Paper

Integrated quantum key distribution system using single sideband detectionMEROLLA, J.-M; DURAFFOURG, L; GOEDGEBUER, J.-P et al.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 141-146, issn 1434-6060Conference Paper

Direct experimental test of non-separability and other quantum techniques using continuous variables of lightKOROLKOVA, N; SILBERHORN, Ch; GLÖCKL, O et al.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 229-235, issn 1434-6060Conference Paper

Statistical confidentiality tests for a quantum transmission using continuous variablesNAVEZ, P.The European physical journal. D, Atomic, molecular and optical physics (Print). 2002, Vol 18, Num 2, pp 219-228, issn 1434-6060Conference Paper

SAFEGUARDING CRYPTOGRAPHIC KEYSBLAKLEY GR.1979; NATIONAL COMPUTER CONFERENCE/1979/NEW YORK NY; USA; MONTVALE: AFIPS PRESS; DA. 1979; PP. 313-317; BIBL. 5 REF.Conference Paper

A novel broadcast encryption based on time-bound cryptographic keysMIHALJEVIC, Miodrag J; FOSSORIER, Marc P. C; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 258-276, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 19 p.Conference Paper

GENERATION, DISTRIBUTION, AND INSTALLATION OF CRYPTOGRAPHIC KEYSMATYAS SM; MEYER CH.1978; I.B.M. SYST. J.; USA; DA. 1978; VOL. 17; NO 2; PP. 126-137; BIBL. 4 REF.Article

Selecting cryptographic key sizesLENSTRA, Arjen K; VERHEUL, Eric R.Journal of cryptology. 2001, Vol 14, Num 4, pp 255-293, issn 0933-2790Article

Templates as master keysAGRAWAL, Dakshi; RAO, Josyula R; ROHATGI, Pankaj et al.Lecture notes in computer science. 2005, pp 15-29, issn 0302-9743, isbn 3-540-28474-5, 15 p.Conference Paper

Daqing production technologies advancingWANG DEXI.China oil and gas. 1999, Vol 6, Num 1, pp 33-35, issn 1006-2696Article

Unconventional cryptographic keying variable managementHERSHEY, J. E; HASSAN, A. A; YARLAGADDA, R et al.IEEE transactions on communications. 1995, Vol 43, Num 1, pp 3-6, issn 0090-6778Article

An optimal algorithm for assigning cryptographic keys to control access in a hierarchyMACKINNON, S. J; TAYLOR, P. D; MEIJER, H et al.IEEE transactions on computers. 1985, Vol 34, Num 9, pp 797-802, issn 0018-9340Article

Cryptographic keys generation using FingerCodesRAMIREZ-RUIZ, José A; PFEIFFER, Carlos F; NOLAZCO-FLORES, Juan A et al.Lecture notes in computer science. 2006, pp 178-187, issn 0302-9743, isbn 3-540-45462-4, 1Vol, 10 p.Conference Paper

ESD issues for advanced CMOS technologiesDUVVURY, C; AMERASEKERA, A.Microelectronics and reliability. 1996, Vol 36, Num 7-8, pp 907-924, issn 0026-2714Article

A novel secret key watermarking systemZHONG, Hua; LIU, Fang; JIAO, Licheng et al.SPIE proceedings series. 2001, pp 121-126, isbn 0-8194-4279-8Conference Paper

Logic for verifying public-key cryptographic protocolsCOFFEY, T; SAIDHA, P.IEE proceedings. Computers and digital techniques. 1997, Vol 144, Num 1, pp 28-32, issn 1350-2387Article

[Advancing Capacitor Technologies]AVARITSIOTIS, J. N.Active and passive electronic components. 2002, Vol 25, Num 2, issn 0882-7516, 80 p.Serial Issue

Vehicular implementations of public key cryptographic techniquesARAZI, B.IEEE transactions on vehicular technology. 1991, Vol 40, Num 3, pp 646-653, issn 0018-9545Article

A public key extension to the common cryptographic architectureLE, A. V; MATYAS, S. M; JOHNSON, D. B et al.IBM systems journal. 1993, Vol 32, Num 3, pp 461-485, issn 0018-8670Article

  • Page / 17638