Journal articles on the topic 'Eavesdropping on the graph state'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Eavesdropping on the graph state.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Stuart, Jeffrey L. "The eavesdropping number of a graph." Czechoslovak Mathematical Journal 59, no. 3 (September 2009): 623–36. http://dx.doi.org/10.1007/s10587-009-0056-9.
Full textSerhiienko, S. P., V. G. Krizhanovski, D. V. Chernov, and L. V. Zagoruiko. "The use of non-steady state noise interferences to counteract passive eavesdropping devices." Radiotekhnika, no. 207 (December 24, 2021): 132–38. http://dx.doi.org/10.30837/rt.2021.4.207.14.
Full textNaik, D. S., C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat. "Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol." Physical Review Letters 84, no. 20 (May 15, 2000): 4733–36. http://dx.doi.org/10.1103/physrevlett.84.4733.
Full textYI, XIAO-JIE, JIAN-MIN WANG, and GUO-QIANG HUANG. "SPLITTING QUANTUM INFORMATION WITH FIVE-ATOM ENTANGLED STATE IN CAVITY QED." International Journal of Quantum Information 08, no. 08 (December 2010): 1289–99. http://dx.doi.org/10.1142/s0219749911007071.
Full textWANG, JIAN, SHENG ZHANG, QUAN ZHANG, and CHAO-JING TANG. "SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATE." International Journal of Quantum Information 10, no. 05 (August 2012): 1250050. http://dx.doi.org/10.1142/s0219749912500505.
Full textLiu Jing-Feng, Tang Zhi-Lie, Liang Rui-Sheng, Li Ling-Yan, Wei Zheng-Jun, Chen Zhi-Xin, Liao Chang-Jun, and Liu Song-Hao. "Eavesdropping on practical QKD system based on six-state protocol." Acta Physica Sinica 54, no. 2 (2005): 517. http://dx.doi.org/10.7498/aps.54.517.
Full textCirac, J. I., and N. Gisin. "Coherent eavesdropping strategies for the four state quantum cryptography protocol." Physics Letters A 229, no. 1 (April 1997): 1–7. http://dx.doi.org/10.1016/s0375-9601(97)00176-x.
Full textCHEN, XIU-BO, TIAN-YIN WANG, JIAN-ZHONG DU, QIAO-YAN WEN, and FU-CHEN ZHU. "CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION." International Journal of Quantum Information 06, no. 03 (June 2008): 543–51. http://dx.doi.org/10.1142/s0219749908003566.
Full textZaidi, Ali Mustafa, and David Greaves. "Value State Flow Graph." ACM Transactions on Reconfigurable Technology and Systems 9, no. 2 (February 3, 2016): 1–22. http://dx.doi.org/10.1145/2807702.
Full textBouajjani, A., J. C. Fernandez, N. Halbwachs, P. Raymond, and C. Ratel. "Minimal state graph generation." Science of Computer Programming 18, no. 3 (June 1992): 247–69. http://dx.doi.org/10.1016/0167-6423(92)90018-7.
Full textChen, Guihong, Xi Liu, Mohammad Shorfuzzaman, Ali Karime, Yonghua Wang, and Yuanhang Qi. "MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs." ACM Transactions on Internet Technology 22, no. 3 (August 31, 2022): 1–17. http://dx.doi.org/10.1145/3453186.
Full textPeng, Yue Hong, Jia Wang Li, Jin Hao Liu, and Yu Min Liu. "Influence of Path Attacks on Security of Six-State Scheme." Applied Mechanics and Materials 263-266 (December 2012): 3114–19. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3114.
Full textBechmann-Pasquinucci, H., and N. Gisin. "Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography." Physical Review A 59, no. 6 (June 1, 1999): 4238–48. http://dx.doi.org/10.1103/physreva.59.4238.
Full textHao, Yuan, Liu Yin-Min, Zhang Wen, and Zhang Zhan-Jun. "Eavesdropping on Quantum Secure Direct Communication with W State in Noisy Channel." Communications in Theoretical Physics 49, no. 1 (January 2008): 103–6. http://dx.doi.org/10.1088/0253-6102/49/1/22.
Full textSHADMAN, Z., H. KAMPERMANN, T. MEYER, and D. BRUß. "OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 07, no. 01 (February 2009): 297–306. http://dx.doi.org/10.1142/s0219749909004554.
Full textQin, Huawang, Wallace K. S. Tang, and Raylin Tso. "Three-party quantum secret sharing based on d-dimensional Bell state." Modern Physics Letters B 33, no. 03 (January 30, 2019): 1950023. http://dx.doi.org/10.1142/s0217984919500234.
Full textBenjamin, Simon C., Daniel E. Browne, Joe Fitzsimons, and John J. L. Morton. "Brokered graph-state quantum computation." New Journal of Physics 8, no. 8 (August 23, 2006): 141. http://dx.doi.org/10.1088/1367-2630/8/8/141.
Full textAntonio, B., D. Markham, and J. Anders. "Adiabatic graph-state quantum computation." New Journal of Physics 16, no. 11 (November 26, 2014): 113070. http://dx.doi.org/10.1088/1367-2630/16/11/113070.
Full textKalampakas, Antonios. "Graph Automata and Graph Colorability." European Journal of Pure and Applied Mathematics 16, no. 1 (January 29, 2023): 112–20. http://dx.doi.org/10.29020/nybg.ejpam.v16i1.4629.
Full textFahmi, A. "New approach to quantum key distribution via quantum encryption." Quantum Information and Computation 9, no. 9&10 (September 2009): 879–98. http://dx.doi.org/10.26421/qic9.9-10-9.
Full textWang, Le, Xianghui Cao, Heng Zhang, Changyin Sun, and Wei Xing Zheng. "Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation." Automatica 137 (March 2022): 110145. http://dx.doi.org/10.1016/j.automatica.2021.110145.
Full textCardoso-Isidoro, C., and F. Delgado. "Quantum Authentication Using Double Teleportation." Journal of Physics: Conference Series 2448, no. 1 (February 1, 2023): 012018. http://dx.doi.org/10.1088/1742-6596/2448/1/012018.
Full textZawadzki, Piotr, and Jarosław Adam Miszczak. "A General Scheme for Information Interception in the Ping-Pong Protocol." Advances in Mathematical Physics 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/3162012.
Full textHwang, Yongsoo, and Jun Heo. "On the relation between a graph code and a graph state." Quantum Information and Computation 16, no. 3&4 (March 2016): 237–50. http://dx.doi.org/10.26421/qic16.3-4-3.
Full textPIRANDOLA, STEFANO. "SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, supp01 (July 2008): 765–71. http://dx.doi.org/10.1142/s0219749908004080.
Full textLiao, Longxia, Xiaoqi Peng, Jinjing Shi, and Ying Guo. "Graph state-based quantum authentication scheme." International Journal of Modern Physics B 31, no. 09 (April 10, 2017): 1750067. http://dx.doi.org/10.1142/s0217979217500679.
Full textKatayama, H., and A. Ichikawa. "Pole assignment by state transition graph." IEEE Transactions on Automatic Control 37, no. 8 (1992): 1196–201. http://dx.doi.org/10.1109/9.151103.
Full textKauffman, Louis H. "A state calculus for graph coloring." Illinois Journal of Mathematics 60, no. 1 (2016): 251–71. http://dx.doi.org/10.1215/ijm/1498032032.
Full textMarzuola, Jeremy L., and Dmitry E. Pelinovsky. "Ground State on the Dumbbell Graph." Applied Mathematics Research eXpress 2016, no. 1 (2016): 98–145. http://dx.doi.org/10.1093/amrx/abv011.
Full textLi, Yipeng, Xiaogang Liu, and Shenggui Zhang. "Laplacian state transfer in Q-graph." Applied Mathematics and Computation 384 (November 2020): 125370. http://dx.doi.org/10.1016/j.amc.2020.125370.
Full textSandhir, Radha Pyari. "State-independent quantum key distribution with two-way classical communication." Quantum Information and Computation 19, no. 15&16 (December 2019): 1279–93. http://dx.doi.org/10.26421/qic19.15-16-2.
Full textACÍN, ANTONIO, NICOLAS GISIN, LLUIS MASANES, and VALERIO SCARANI. "BELL'S INEQUALITIES DETECT EFFICIENT ENTANGLEMENT." International Journal of Quantum Information 02, no. 01 (March 2004): 23–31. http://dx.doi.org/10.1142/s0219749904000043.
Full textCai, Deng, and Wai Lam. "Graph Transformer for Graph-to-Sequence Learning." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 7464–71. http://dx.doi.org/10.1609/aaai.v34i05.6243.
Full textLiu, Chenghua, Zhuolin Liao, Yixuan Ma, and Kun Zhan. "Stationary Diffusion State Neural Estimation for Multiview Clustering." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 7 (June 28, 2022): 7542–49. http://dx.doi.org/10.1609/aaai.v36i7.20719.
Full textYang, Chunxin, Ryan P. Scott, David J. Geisler, Nicolas K. Fontaine, Jonathan P. Heritage, and S. J. Ben Yoo. "Four-State Data Encoding for Enhanced Security Against Upstream Eavesdropping in SPECTS O-CDMA." Journal of Lightwave Technology 29, no. 1 (January 2011): 62–68. http://dx.doi.org/10.1109/jlt.2010.2090129.
Full textAdcock, Jeremy C., Sam Morley-Short, Axel Dahlberg, and Joshua W. Silverstone. "Mapping graph state orbits under local complementation." Quantum 4 (August 7, 2020): 305. http://dx.doi.org/10.22331/q-2020-08-07-305.
Full textANGELES-CANUL, RICARDO JAVIER, RACHAEL M. NORTON, MICHAEL C. OPPERMAN, CHRISTOPHER C. PARIBELLO, MATTHEW C. RUSSELL, and CHRISTINO TAMON. "QUANTUM PERFECT STATE TRANSFER ON WEIGHTED JOIN GRAPHS." International Journal of Quantum Information 07, no. 08 (December 2009): 1429–45. http://dx.doi.org/10.1142/s0219749909006103.
Full textBechmann-Pasquinucci, H., and N. Gisin. "Bell inequality for quNits with binary measurements." Quantum Information and Computation 3, no. 2 (March 2003): 157–64. http://dx.doi.org/10.26421/qic3.2-6.
Full textQian, Pengzhi, Yu Zhang, Xiaojuan Yan, Yong Chen, and Yifu Sun. "A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT." Electronics 12, no. 11 (June 2, 2023): 2507. http://dx.doi.org/10.3390/electronics12112507.
Full textCoutinho, Gabriel, and Chris Godsil. "Perfect state transfer is poly-time." Quantum Information and Computation 17, no. 5&6 (April 2017): 495–502. http://dx.doi.org/10.26421/qic17.5-6-8.
Full textKAWASAKI, Yosuke, and Masaki TAKAHASHI. "World state dependent action graph based on knowledge representation using scene graph." Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec) 2022 (2022): 1A1—T08. http://dx.doi.org/10.1299/jsmermd.2022.1a1-t08.
Full textBrown, John, Chris Godsil, Devlin Mallory, Abigail Raz, and Christino Tamon. "Perfect state transfer on signed graphs." Quantum Information and Computation 13, no. 5&6 (May 2013): 511–30. http://dx.doi.org/10.26421/qic13.5-6-10.
Full textLi, Jian, HaiFei Jin, and Bo Jing. "Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol." Chinese Science Bulletin 57, no. 34 (November 20, 2012): 4434–41. http://dx.doi.org/10.1007/s11434-012-5516-1.
Full textLi, Jian, Hai-Fei Jin, and Bo Jing. "Improved Eavesdropping Detection Strategy in Quantum Direct Communication Protocol Based on Five-Particle Cluster State." International Journal of Theoretical Physics 51, no. 9 (April 19, 2012): 2759–70. http://dx.doi.org/10.1007/s10773-012-1151-5.
Full textLiao, Longxia, Xiaoqi Peng, Jinjing Shi, and Ying Guo. "Graph State-Based Quantum Group Authentication Scheme." Journal of the Physical Society of Japan 86, no. 2 (February 15, 2017): 024403. http://dx.doi.org/10.7566/jpsj.86.024403.
Full textHerrera-Marti, David A., and Terry Rudolph. "Loss tolerance with a concatenated graph state." Quantum Information and Computation 13, no. 11&12 (November 2013): 995–1006. http://dx.doi.org/10.26421/qic13.11-12-6.
Full textHajdušek, M., and M. Murao. "Direct evaluation of pure graph state entanglement." New Journal of Physics 15, no. 1 (January 17, 2013): 013039. http://dx.doi.org/10.1088/1367-2630/15/1/013039.
Full textTian, Yu-Ling, Tian-Feng Feng, and Xiao-Qi Zhou. "Collaborative quantum computation with redundant graph state." Acta Physica Sinica 68, no. 11 (2019): 110302. http://dx.doi.org/10.7498/aps.68.20190142.
Full textZambon, Eduardo, and Arend Rensink. "Graph Subsumption in Abstract State Space Exploration." Electronic Proceedings in Theoretical Computer Science 99 (October 23, 2012): 35–49. http://dx.doi.org/10.4204/eptcs.99.6.
Full textKaur, Hargeet, and Atul Kumar. "An Improved Ping-Pong Protocol Using Three-Qubit Nonmaximally Nonorthogonal Entangled States." Zeitschrift für Naturforschung A 74, no. 9 (September 25, 2019): 799–811. http://dx.doi.org/10.1515/zna-2018-0448.
Full text