Tips on using this search form
- All search terms are case-insensitive
- If you specify more than one search option (e.g. you search for both "Authors" and "Paper title") then the publications returned will be those that match all of your search terms
- To reset the search form, click here
- Currently displaying 221 - 240 of 403 publications
Memory attacks on device-independent quantum cryptography.
– Phys Rev Lett
(2013)
110,
010503
Unconditionally secure device-independent quantum key distribution with only two devices
– Physical Review A Atomic Molecular and Optical Physics
(2012)
86,
062326
(doi: 10.1103/physreva.86.062326)
Security for control systems under sensor and actuator attacks.
– 2012 IEEE 51ST ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC)
(2012)
3412
(doi: 10.1109/cdc.2012.6426811)
One-Shot Entanglement-Assisted Quantum and Classical Communication
– IEEE Transactions on Information Theory
(2012)
59,
1929
(doi: 10.1109/tit.2012.2228737)
General Theory of Environment-Assisted Entanglement Distillation
– IEEE Transactions on Information Theory
(2012)
59,
1940
(doi: 10.1109/TIT.2012.2227673)
Security details for bit commitment by transmitting measurement outcomes
– Physical Review A Atomic Molecular and Optical Physics
(2012)
86,
052309
(doi: 10.1103/physreva.86.052309)
Fundamental quantum optics experiments conceivable with satellites—reaching relativistic distances and velocities
– Classical and Quantum Gravity
(2012)
29,
224011
Quantum tasks in Minkowski space
– Classical and Quantum Gravity
(2012)
29,
224013
Quantum rate distortion, reverse shannon theorems, and source-channel separation
– IEEE Transactions on Information Theory
(2012)
59,
615
(doi: 10.1109/tit.2012.2215575)
A no-summoning theorem in relativistic quantum theory
– Quantum Information Processing
(2012)
12,
1023
(doi: 10.1007/s11128-012-0431-6)
AGAINST MANY-WORLDS INTERPRETATIONS
– International Journal of Modern Physics A
(2012)
05,
1745
(doi: 10.1142/s0217751x90000805)
A no-summoning theorem in relativistic quantum theory
– Quantum Information Processing
(2012)
1
Secure estimation and control for cyber-physical systems under adversarial attacks
– CoRR
(2012)
abs/1205.5073,
An improved self-triggered implementation for linear controllers*
– IFAC Proceedings Volumes
(2012)
45,
37
Entangling and disentangling capacities of noisy interactions
– International Journal of Quantum Information
(2011)
6,
675
(doi: 10.1142/S0219749908003943)
Additivity for transpose depolarizing channels
– International Journal of Quantum Information
(2011)
04,
85
(doi: 10.1142/s0219749906001633)
Max-relative entropy of entanglement, alias log robustness
– International Journal of Quantum Information
(2011)
07,
475
(doi: 10.1142/S0219749909005298)
Additivity in isotropic quantum spin channels
– International Journal of Quantum Information
(2011)
04,
473
(doi: 10.1142/S0219749906001931)
Real World Interpretations of Quantum Theory
– Foundations of Physics
(2011)
42,
421
(doi: 10.1007/s10701-011-9610-z)