共 50 条
- [4] Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator Quantum Information Processing, 2020, 19
- [6] Database Transformation To Build Data-set For Data Mining Analysis - A Review 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 386 - 389
- [7] A Bayesian based finite-size effect analysis of QKD ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 2, 2017, 64 : 163 - 170
- [8] Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources SCIENTIFIC REPORTS, 2015, 5
- [9] Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources Scientific Reports, 5
- [10] Wavefield downward extrapolation for migration velocity analysis on Marmousi data-set Acta Geophysica, 2007, 55 : 209 - 221