Author of the publication

Security proof of quantum key distribution with detection efficiency mismatch.

, , , , and . Quantum Information & Computation, 9 (1): 131-165 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An unequal clustering algorithm based on virtual blocks for wireless sensor networks., , and . FSKD, page 1109-1112. IEEE, (2011)An Improved Fuzzy Image Enhancement Algorithm., , and . FSKD (1), page 186-189. IEEE Computer Society, (2008)Workload Based Optimization Model for Parallel Disk Systems., and . ITNG, page 206-209. IEEE Computer Society, (2013)Accurate Assessment of Link Loss Rate in Wireless Mesh Networks., , and . ITNG, page 862-866. IEEE Computer Society, (2010)Security proof of quantum key distribution with detection efficiency mismatch., , , , and . Quantum Information & Computation, 9 (1): 131-165 (2009)Applications of forecasting based dynamic p-cycle reconfiguration under reliable optical network in smart grid., , , , and . Computer Communications, (2014)An Efficient p-Trail Based Protection Algorithm With Load Balance in Electric Power Communication Network., , , , , , , and . IEEE Access, (2018)Comparative static analysis of provincial agricultural science and technology level based on grey clustering., , and . Grey Systems: T&A, 8 (4): 481-493 (2018)Modification of an RBF ANN-Based Temperature Compensation Model of Interferometric Fiber Optical Gyroscopes., , , and . Sensors, 15 (5): 11189-11207 (2015)Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber., , , , and . ISIT, page 2094-2098. IEEE, (2006)