-
2
-
-
27744452343
-
Optical network security: Technical analysis of fiber tapping mechanisms and methods for detection & prevention
-
MILCOM 2004 - 2004 IEEE Military Communications Conference
-
K. Shaneman and S. Gray, "Optical network security: technical analysis of fiber tapping mechanisms and methods for detection prevention," in IEEE Military Communications Conf. (MILCOM), 2004, vol. 2, pp. 711-716. (Pubitemid 41609934)
-
(2004)
Proceedings - IEEE Military Communications Conference MILCOM
, vol.2
, pp. 711-716
-
-
Shaneman, K.1
Gray, S.2
-
3
-
-
80051743311
-
Optical layer security in fiber-optic networks
-
M. P. Fok, Z. Wang, Y. Deng, and P. R. Prucnal, "Optical layer security in fiber-optic networks," IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3, pp. 725-736, 2011.
-
(2011)
IEEE Trans. Inf. Forensics Secur
, vol.6
, Issue.3
, pp. 725-736
-
-
Fok, M.P.1
Wang, Z.2
Deng, Y.3
Prucnal, P.R.4
-
5
-
-
80053104782
-
Challenges in next-generation optical access networks: Addressing reach extension and security weaknesses
-
L. G. Kazovsky, S.-W. Wong, V. Gudla, P. T. Afshar, S.-H. Yen, S. Yamashita, and Y. Yan, "Challenges in next-generation optical access networks: addressing reach extension and security weaknesses," IET Optoelectron., vol. 5, no. 4, pp. 133-143, 2011.
-
(2011)
IET Optoelectron
, vol.5
, Issue.4
, pp. 133-143
-
-
Kazovsky, L.G.1
Wong, S.-W.2
Gudla, V.3
Afshar, P.T.4
Yen, S.-H.5
Yamashita, S.6
Yan, Y.7
-
6
-
-
84955575947
-
The magic words are squeamish ossifrage
-
D. Atkins, M. Graff, A. K. Lenstra, and P. C. Leyland, "The magic words are squeamish ossifrage," in Proc. of the 4th Int. Conf. on the Theory and Applications of Cryptology: Advances in Cryptology, 1995, pp. 263-277.
-
(1995)
Proc. of the 4th Int. Conf. on the Theory and Applications of Cryptology: Advances in Cryptology
, pp. 263-277
-
-
Atkins, D.1
Graff, M.2
Lenstra, A.K.3
Leyland, P.C.4
-
8
-
-
33751508709
-
Recommendation for key management-part 1: General (revised)
-
E. Barker,W. Barker, W. Burr,W. Polk, and M. Smid, "Recommendation for key management-part 1: General (revised)," in NIST Special Publication, 2006.
-
(2006)
NIST Special Publication
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
9
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys., vol. 74, no. 1, pp. 145-195, 2002.
-
(2002)
Rev. Mod. Phys
, vol.74
, Issue.1
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
10
-
-
84855400682
-
Long-term performance of the SwissQuantum quantum key distribution network in a field environment
-
D. Stucki, M. Legré, F. Buntschu, B. Clausen, N. Felber, N. Gisin, L. Henzen, P. Junod, G. Litzistorf, P. Monbaron, L. Monat, J.-B. Page, D. Perroud, G. Ribordy, A. Rochas, S. Robyr, J. Tavares, R. Thew, P. Trinkler, S. Ventura, R. Voirol, N. Walenta, and H. Zbinden, "Long-term performance of the SwissQuantum quantum key distribution network in a field environment," New J. Phys., vol. 13, no. 12, 123001, 2011.
-
(2011)
New J. Phys
, vol.13
, Issue.12
, pp. 123001
-
-
Stucki, D.1
Legré, M.2
Buntschu, F.3
Clausen, B.4
Felber, N.5
Gisin, N.6
Henzen, L.7
Junod, P.8
Litzistorf, G.9
Monbaron, P.10
Monat, L.11
Page, J.-B.12
Perroud, D.13
Ribordy, G.14
Rochas, A.15
Robyr, S.16
Tavares, J.17
Thew, R.18
Trinkler, P.19
Ventura, S.20
Voirol, R.21
Walenta, N.22
Zbinden, H.23
more..
-
11
-
-
84863767690
-
Field test of classical symmetric encryption with continuous variables quantum key distribution
-
P. Jouguet, S. Kunz-Jacques, T. Debuisschert, S. Fossier, E. Diamanti, R. Alléaume, R. Tualle-Brouri, P. Grangier, A. Leverrier, P. Pache, and P. Painchault, "Field test of classical symmetric encryption with continuous variables quantum key distribution," Opt. Express, vol. 20, no. 13, pp. 14030-14041, 2012.
-
(2012)
Opt. Express
, vol.20
, Issue.13
, pp. 14030-14041
-
-
Jouguet, P.1
Kunz-Jacques, S.2
Debuisschert, T.3
Fossier, S.4
Diamanti, E.5
Alléaume, R.6
Tualle-Brouri, R.7
Grangier, P.8
Leverrier, A.9
Pache, P.10
Painchault, P.11
-
12
-
-
33746708860
-
A single quantum cannot be cloned
-
W. K.Wootters andW. H. Zurek, "A single quantum cannot be cloned," Nature, vol. 299, no. 5886, pp. 802-803, 1982.
-
(1982)
Nature
, vol.299
, Issue.5886
, pp. 802-803
-
-
Wootters, W.K.1
Zurek, W.H.2
-
13
-
-
0028523458
-
Design of quantum cryptography systems for passive optical networks
-
P. D. Townsend, S. J. D. Phoenix, K. J. Blow, and S. M. Barnett, "Design of quantum cryptography systems for passive optical networks," Electron. Lett., vol. 30, no. 22, pp. 1875-1877, 1994.
-
(1994)
Electron. Lett
, vol.30
, Issue.22
, pp. 1875-1877
-
-
Townsend, P.D.1
Phoenix, S.J.D.2
Blow, K.J.3
Barnett, S.M.4
-
14
-
-
0242365638
-
Experimental investigation of quantum key distribution through transparent optical switch elements
-
P. Toliver, R. J. Runser, T. E. Chapuran, J. L. Jackel, T. C. Banwell, M. S. Goodman, R. J. Hughes, C. G. Peterson, D. Derkacs, J. E. Nordholt, L. Mercer, S. McNown, A. Goldman, and J. Blake, "Experimental investigation of quantum key distribution through transparent optical switch elements," IEEE Photon. Technol. Lett., vol. 15, no. 11, pp. 1669-1671, 2003.
-
(2003)
IEEE Photon. Technol. Lett
, vol.15
, Issue.11
, pp. 1669-1671
-
-
Toliver, P.1
Runser, R.J.2
Chapuran, T.E.3
Jackel, J.L.4
Banwell, T.C.5
Goodman, M.S.6
Hughes, R.J.7
Peterson, C.G.8
Derkacs, D.9
Nordholt, J.E.10
Mercer, L.11
McNown, S.12
Goldman, A.13
Blake, J.14
-
15
-
-
84872382489
-
QKD in standard optical telecommunications networks
-
D. Lancho, J. Martínez, D. Elkouss, M. Soto, and V. Martín, "QKD in standard optical telecommunications networks," in 1st Int. Conf. on Quantum Communication and Quantum Networking, 2010, vol. 36, pp. 142-149.
-
(2010)
1st Int. Conf. on Quantum Communication and Quantum Networking
, vol.36
, pp. 142-149
-
-
Lancho, D.1
Martínez, J.2
Elkouss, D.3
Soto, M.4
Martín, V.5
-
16
-
-
72149085721
-
Technologies for quantum key distribution networks integrated with optical communication networks
-
W. Maeda, A. Tanaka, S. Takahashi, A. Tajima, and A. Tomita, "Technologies for quantum key distribution networks integrated with optical communication networks," IEEE J. Sel. Top. Quantum Electron., vol. 15, no. 6, pp. 1591-1601, 2009.
-
(2009)
IEEE J. Sel. Top. Quantum Electron
, vol.15
, Issue.6
, pp. 1591-1601
-
-
Maeda, W.1
Tanaka, A.2
Takahashi, S.3
Tajima, A.4
Tomita, A.5
-
17
-
-
70749092228
-
Optical networking for quantum key distribution and quantum communications
-
T. E. Chapuran, P. Toliver, N. A. Peters, J. Jackel, M. S. Goodman, R. J. Runser, S. R. McNown, N. Dallmann, R. J. Hughes, K. P. McCabe, J. E. Nordholt, C. G. Peterson, K. T. Tyagi, L. Mercer, and H. Dardy, "Optical networking for quantum key distribution and quantum communications," New J. Phys., vol. 11, no. 10, 105001, 2009.
-
(2009)
New J. Phys
, vol.11
, Issue.10
, pp. 105001
-
-
Chapuran, T.E.1
Toliver, P.2
Peters, N.A.3
Jackel, J.4
Goodman, M.S.5
Runser, R.J.6
McNown, S.R.7
Dallmann, N.8
Hughes, R.J.9
McCabe, K.P.10
Nordholt, J.E.11
Peterson, C.G.12
Tyagi, K.T.13
Mercer, L.14
Dardy, H.15
-
18
-
-
78149454063
-
Feasibility of quantum key distribution through a dense wavelength division multiplexing network
-
B. Qi, W. Zhu, L. Qian, and H.-K. Lo, "Feasibility of quantum key distribution through a dense wavelength division multiplexing network," New J. Phys., vol. 12, no. 10, 103042, 2010.
-
(2010)
New J. Phys
, vol.12
, Issue.10
, pp. 103042
-
-
Qi, B.1
Zhu, W.2
Qian, L.3
Lo, H.-K.4
-
19
-
-
80054874572
-
Security in photonic networks: Threats and security enhancement
-
K.-I. Kitayama, M. Sasaki, S. Araki, M. Tsubokawa, A. Tomita, K. Inoue, K. Harasawa, Y. Nagasako, and A. Takada, "Security in photonic networks: threats and security enhancement," J. Lightwave Technol., vol. 29, no. 21, pp. 3210-3222, 2011.
-
(2011)
J. Lightwave Technol
, vol.29
, Issue.21
, pp. 3210-3222
-
-
Kitayama, K.-I.1
Sasaki, M.2
Araki, S.3
Tsubokawa, M.4
Tomita, A.5
Inoue, K.6
Harasawa, K.7
Nagasako, Y.8
Takada, A.9
-
20
-
-
84863339607
-
2 GHz clock quantum key distribution over 260 km of standard telecom fiber
-
S.Wang,W. Chen, J. Guo, Z. Yin, H. Li, Z. Zhou, G. Guo, and Z. Han, "2 GHz clock quantum key distribution over 260 km of standard telecom fiber," Opt. Lett., vol. 37, no. 6, pp. 1008-1010, 2012.
-
(2012)
Opt. Lett
, vol.37
, Issue.6
, pp. 1008-1010
-
-
Wang, S.1
Chen, W.2
Guo, J.3
Yin, Z.4
Li, H.5
Zhou, Z.6
Guo, G.7
Han, Z.8
-
21
-
-
1242285756
-
Building the quantum network
-
C. Elliot, "Building the quantum network," New J. Phys., vol. 4, no. 1, 46, 2002.
-
(2002)
New J. Phys
, vol.4
, Issue.1
, pp. 46
-
-
Elliot, C.1
-
22
-
-
67651210369
-
The SECOQC quantum key distribution network in Vienna
-
M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J. F. Dynes, S. Fasel, S. Fossier, M. Fürst, J.-D. Gautier, O. Gay, N. Gisin, P. Grangier, A. Happe, Y. Hasani, M. Hentschel, H. Hübel, G. Humer, T. Länger, M. Legré, R. Lieger, J. Lodewyck, T. Lorünser, N. Lütkenhaus, A. Marhold, T. Matyus, O. Maurhart, L. Monat, S. Nauerth, J.-B. Page, A. Poppe, E. Querasser, G. Ribordy, S. Robyr, L. Salvail, A. W. Sharpe, A. J. Shields, D. Stucki, M. Suda, C. Tamas, T. Themel, R. T. Thew, Y. Thoma, A. Treiber, P. Trinkler, R. Tualle-Brouri, F. Vannel,N.Walenta, H.Weier, H.Weinfurter, I. Wimberger, Z. L. Yuan, H. Zbinden, and A. Zeilinger, "The SECOQC quantum key distribution network in Vienna," New J. Phys., vol. 11, no. 7, 075001, 2009.
-
(2009)
New J. Phys
, vol.11
, Issue.7
, pp. 075001
-
-
Peev, M.1
Pacher, C.2
Alléaume, R.3
Barreiro, C.4
Bouda, J.5
Boxleitner, W.6
Debuisschert, T.7
Diamanti, E.8
Dianati, M.9
Dynes, J.F.10
Fasel, S.11
Fossier, S.12
Fürst, M.13
Gautier, J.-D.14
Gay, O.15
Gisin, N.16
Grangier, P.17
Happe, A.18
Hasani, Y.19
Hentschel, M.20
Hübel, H.21
Humer, G.22
Länger, T.23
Legré, M.24
Lieger, R.25
Lodewyck, J.26
Lorünser, T.27
Lütkenhaus, N.28
Marhold, A.29
Matyus, T.30
Maurhart, O.31
Monat, L.32
Nauerth, S.33
Page, J.-B.34
Poppe, A.35
Querasser, E.36
Ribordy, G.37
Robyr, S.38
Salvail, L.39
Sharpe, A.W.40
Shields, A.J.41
Stucki, D.42
Suda, M.43
Tamas, C.44
Themel, T.45
Thew, R.T.46
Thoma, Y.47
Treiber, A.48
Trinkler, P.49
Tualle-Brouri, R.50
Vannel, F.51
Walenta, N.52
Weier, H.53
Weinfurter, H.54
Wimberger, I.55
Yuan, Z.L.56
Zbinden, H.57
Zeilinger, A.58
more..
-
23
-
-
79957605027
-
Field test of quantum key distribution in the Tokyo QKD network
-
M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura, J. Dynes, A. Dixon, A. Sharpe, Z. Yuan, A. Shields, S. Uchikoga, M. Legré, S. Robyr, P. Trinkler, L. Monat, J. Page, G. Ribordy, A. Poppe, A. Allacher, O. Maurhart, T. Länger, M. Peev, and A. Zeilinger, "Field test of quantum key distribution in the Tokyo QKD network," Opt. Express, vol. 19, no. 11, pp. 10387-10409, 2011.
-
(2011)
Opt. Express
, vol.19
, Issue.11
, pp. 10387-10409
-
-
Sasaki, M.1
Fujiwara, M.2
Ishizuka, H.3
Klaus, W.4
Wakui, K.5
Takeoka, M.6
Miki, S.7
Yamashita, T.8
Wang, Z.9
Tanaka, A.10
Yoshino, K.11
Nambu, Y.12
Takahashi, S.13
Tajima, A.14
Tomita, A.15
Domeki, T.16
Hasegawa, T.17
Sakai, Y.18
Kobayashi, H.19
Asai, T.20
Shimizu, K.21
Tokura, T.22
Tsurumaru, T.23
Matsui, M.24
Honjo, T.25
Tamaki, K.26
Takesue, H.27
Tokura, Y.28
Dynes, J.29
Dixon, A.30
Sharpe, A.31
Yuan, Z.32
Shields, A.33
Uchikoga, S.34
Legré, M.35
Robyr, S.36
Trinkler, P.37
Monat, L.38
Page, J.39
Ribordy, G.40
Poppe, A.41
Allacher, A.42
Maurhart, O.43
Länger, T.44
Peev, M.45
Zeilinger, A.46
more..
-
24
-
-
2442492740
-
Quantum repeaters: The role of imperfect local operations in quantum communication
-
H.-J. Briegel, W. Dür, J. I. Cirac, and P. Zoller, "Quantum repeaters: the role of imperfect local operations in quantum communication," Phys. Rev. Lett., vol. 81, no. 26, pp. 5932-5935, 1998. (Pubitemid 128628297)
-
(1998)
Physical Review Letters
, vol.81
, Issue.26
, pp. 5932-5935
-
-
Briegel, H.-J.1
Dur, W.2
Cirac, J.I.3
Zoller, P.4
-
25
-
-
67651230054
-
Topological optimization of quantum key distribution networks
-
R. Alléaume, F. Roueff, E. Diamanti, and N. Lütkenhaus, "Topological optimization of quantum key distribution networks," New J. Phys., vol. 11, no. 7, 075002, 2009.
-
(2009)
New J. Phys
, vol.11
, Issue.7
, pp. 075002
-
-
Alléaume, R.1
Roueff, F.2
Diamanti, E.3
Lütkenhaus, N.4
-
26
-
-
0003584029
-
-
National Institute of Standards and Technology FIPS PUB 140-2
-
National Institute of Standards and Technology, "Security requirements for cryptographic modules," FIPS PUB 140-2, 2001.
-
(2001)
Security requirements for cryptographic modules
-
-
-
27
-
-
84876240352
-
-
Common Criteria [Online] Available
-
Common Criteria [Online]. Available: http://www .commoncriteriaportal. org.
-
-
-
-
28
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y. Li, and R. Yeung, "Network information flow," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1204-1216, 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.3
Yeung, R.4
-
29
-
-
79951948185
-
Theory of secure network coding
-
N. Cai and T. Chan, "Theory of secure network coding," Proc. IEEE, vol. 99, no. 3, pp. 421-437, 2011.
-
(2011)
Proc. IEEE
, vol.99
, Issue.3
, pp. 421-437
-
-
Cai, N.1
Chan, T.2
-
30
-
-
84876246771
-
-
University of Nebraska Lincoln, NE, Tech. Rep
-
E. D. Manley, J. S. Deogun, L. Xu, and D. R. Alexander, "Network coding for WDM all-optical multicast," University of Nebraska, Lincoln, NE, Tech. Rep., 2008.
-
(2008)
Network Coding for WDM All-optical Multicast
-
-
Manley, E.D.1
Deogun, J.S.2
Xu, L.3
Alexander, D.R.4
-
31
-
-
80051802777
-
Overlay protection against link failures using network coding
-
A. E.Kamal,A.Ramamoorthy, L.Long,andL.Shizheng, "Overlay protection against link failures using network coding," IEEE/ACM Trans. Netw., vol. 19, no. 4, pp. 1071-1084, 2011.
-
(2011)
IEEE/ACM Trans. Netw
, vol.19
, Issue.4
, pp. 1071-1084
-
-
Kamal, A.E.1
Ramamoorthy, A.2
Longand, L.3
Shizheng, L.4
-
32
-
-
77953689951
-
Alloptical network coding
-
E. D. Manley, J. S. Deogun, L. Xu, and D. R. Alexander, "Alloptical network coding," J. Opt. Commun. Netw., vol. 2, no. 4, pp. 175-191, 2010.
-
(2010)
J. Opt. Commun. Netw
, vol.2
, Issue.4
, pp. 175-191
-
-
Manley, E.D.1
Deogun, J.S.2
Xu, L.3
Alexander, D.R.4
-
34
-
-
77957852703
-
Network coding in passive optical networks
-
K. Miller, T. Biermann, H. Woesner, and H. Karl, "Network coding in passive optical networks," in IEEE Int. Symp. on Network Coding (NetCod), 2010, pp. 1-6.
-
(2010)
IEEE Int. Symp. on Network Coding (NetCod)
, pp. 1-6
-
-
Miller, K.1
Biermann, T.2
Woesner, H.3
Karl, H.4
-
35
-
-
80052637893
-
Network coding in nextgeneration passive optical networks
-
K. Fouli, M. Maier, and M. Medard, "Network coding in nextgeneration passive optical networks," IEEE Commun. Mag., vol. 49, no. 9, pp. 38-46, 2011.
-
(2011)
IEEE Commun. Mag
, vol.49
, Issue.9
, pp. 38-46
-
-
Fouli, K.1
Maier, M.2
Medard, M.3
-
38
-
-
0027341860
-
Perfectly secure message transmission
-
D. Dolev, C. Dwork, O.Waarts, and M. Yung, "Perfectly secure message transmission," J.ACM, vol. 40, no. 1, pp. 17-47, 1993.
-
(1993)
J.ACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
39
-
-
45249101743
-
Resilient network coding in the presence of Byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, and M. Effros, "Resilient network coding in the presence of Byzantine adversaries," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2596-2603, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
Effros, M.7
-
40
-
-
71749089462
-
Security of trusted repeater quantum key distribution networks
-
L. Salvail, M. Peev, E. Diamanti, R. Alléaume, N. Lütkenhaus, and T. Länger, "Security of trusted repeater quantum key distribution networks," J. Comput. Secur., vol. 18, no. 1, pp. 61-87, 2010.
-
(2010)
J. Comput. Secur
, vol.18
, Issue.1
, pp. 61-87
-
-
Salvail, L.1
Peev, M.2
Diamanti, E.3
Alléaume, R.4
Lütkenhaus, N.5
Länger, T.6
-
41
-
-
2942611260
-
Quantum key distribution over 122 km of standard telecom fiber
-
C. Gobby, Z. L. Yuan, and A. J. Shields, "Quantum key distribution over 122 km of standard telecom fiber," Appl. Phys. Lett., vol. 84, no. 19, p. 3762, 2004.
-
(2004)
Appl. Phys. Lett
, vol.84
, Issue.19
, pp. 3762
-
-
Gobby, C.1
Yuan, Z.L.2
Shields, A.J.3
-
42
-
-
84876204797
-
-
ID Quantique SA [Online] Available
-
ID Quantique SA [Online]. Available: http://www.idquantique .com.
-
-
-
-
43
-
-
27144453296
-
Practical decoy state for quantum key distribution
-
X. Ma, H.-K. Lo, Y. Zhao, and B. Qi, "Practical decoy state for quantum key distribution," Phys. Rev. A, vol. 72, no. 1, 012326, 2005.
-
(2005)
Phys. Rev. A
, vol.72
, Issue.1
, pp. 012326
-
-
Ma, X.1
Lo, H.-K.2
Zhao, Y.3
Qi, B.4
-
44
-
-
84876213226
-
Experimental demonstration of continuousvariable quantum key distribution over 80 km of standard telecom fiber
-
presented at the
-
P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, "Experimental demonstration of continuousvariable quantum key distribution over 80 km of standard telecom fiber," presented at the 2nd Annu. Conf. on Quantum Cryptography (QCRYPT), 2012.
-
(2012)
2nd Annu. Conf. on Quantum Cryptography (QCRYPT)
-
-
Jouguet, P.1
Kunz-Jacques, S.2
Leverrier, A.3
Grangier, P.4
Diamanti, E.5
-
45
-
-
84862007564
-
Microwave photonics parallel quantum key distribution
-
A. Ruiz-Alba, J. Mora, W. Amava, A. Martínez, V. García-Muñoz, D. Calvo, and J. Capmany, "Microwave photonics parallel quantum key distribution," IEEE Photon. J., vol. 4, no. 3, pp. 931-942, 2012.
-
(2012)
IEEE Photon. J
, vol.4
, Issue.3
, pp. 931-942
-
-
Ruiz-Alba, A.1
Mora, J.2
Amava, W.3
Martínez, A.4
García- Muñoz, V.5
Calvo, D.6
Capmany, J.7
-
46
-
-
79952712286
-
Secure deviceindependent quantum key distribution with causally independent measurement devices
-
L. Masanes, S. Pironio, and A. Acín, "Secure deviceindependent quantum key distribution with causally independent measurement devices," Nat. Commun., vol. 2, 238, 2011.
-
(2011)
Nat. Commun
, vol.2
, pp. 238
-
-
Masanes, L.1
Pironio, S.2
Acín, A.3
-
48
-
-
77952045120
-
Quantum key distribution on a 10 Gb?s WDM-PON
-
I. Choi, R. J. Young, and P. D. Townsend, "Quantum key distribution on a 10 Gb?s WDM-PON," Opt. Express, vol. 18, no. 9, pp. 9600-9612, 2010.
-
(2010)
Opt. Express
, vol.18
, Issue.9
, pp. 9600-9612
-
-
Choi, I.1
Young, R.J.2
Townsend, P.D.3
-
49
-
-
77953565629
-
Quantum key distribution and 1 Gbps data encryption over a single fibre
-
P. Eraerds, N. Walenta, M. Legré, N. Gisin, and H. Zbinden, "Quantum key distribution and 1 Gbps data encryption over a single fibre," New J. Phys., vol. 12, no. 6, 063027, 2010.
-
(2010)
New J. Phys
, vol.12
, Issue.6
, pp. 063027
-
-
Eraerds, P.1
Walenta, N.2
Legré, M.3
Gisin, N.4
Zbinden, H.5
-
50
-
-
9244243101
-
Fiber-to-The-home services based on wavelengthdivision-multiplexing passive optical network
-
S.-J. Park, C.-H. Lee, K.-T. Jeong, H.-J. Park, J.-G. Ahn, and K.-H. Song, "Fiber-to-the-home services based on wavelengthdivision-multiplexing passive optical network," J. Lightwave Technol., vol. 22, no. 11, pp. 2582-2591, 2004.
-
(2004)
J. Lightwave Technol
, vol.22
, Issue.11
, pp. 2582-2591
-
-
Park, S.-J.1
Lee, C.-H.2
Jeong, K.-T.3
Park, H.-J.4
Ahn, J.-G.5
Song, K.-H.6
-
51
-
-
67651213420
-
High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres
-
D. Stucki, N. Walenta, F. Vannel, R. T. Thew, N. Gisin, H. Zbinden, S. Gray, C. R. Towery, and S. Ten, "High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres," New J. Phys., vol. 11, no. 7, 075003, 2009.
-
(2009)
New J. Phys
, vol.11
, Issue.7
, pp. 075003
-
-
Stucki, D.1
Walenta, N.2
Vannel, F.3
Thew, R.T.4
Gisin, N.5
Zbinden, H.6
Gray, S.7
Towery, C.R.8
Ten, S.9
-
52
-
-
0037101027
-
Differential phase shift quantum key distribution
-
K. Inoue, E.Waks, and Y. Yamamoto, "Differential phase shift quantum key distribution," Phys. Rev. Lett., vol. 89, no. 3, 037902, 2002.
-
(2002)
Phys. Rev. Lett
, vol.89
, Issue.3
, pp. 037902
-
-
Inoue, K.1
Waks, E.2
Yamamoto, Y.3
-
53
-
-
56149113102
-
Gigahertz decoy quantum key distribution with 1 Mbit?s secure key rate
-
A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, "Gigahertz decoy quantum key distribution with 1 Mbit?s secure key rate," Opt. Express, vol. 16, no. 23, pp. 18790-18979, 2008.
-
(2008)
Opt. Express
, vol.16
, Issue.23
, pp. 18790-18979
-
-
Dixon, A.R.1
Yuan, Z.L.2
Dynes, J.F.3
Sharpe, A.W.4
Shields, A.J.5
-
54
-
-
79957621147
-
High-rate quantum key distribution over 100 km using ultra-low-noise, 2 GHz sinusoidally gated InGaAs/InP avalanche photodiodes
-
N. Namekata, H. Takesue, T. Honjo, Y. Tokura, and S. Inoue, "High-rate quantum key distribution over 100 km using ultra-low-noise, 2 GHz sinusoidally gated InGaAs/InP avalanche photodiodes," Opt. Express, vol. 19, no. 11, pp. 10632-10639, 2011.
-
(2011)
Opt. Express
, vol.19
, Issue.11
, pp. 10632-10639
-
-
Namekata, N.1
Takesue, H.2
Honjo, T.3
Tokura, Y.4
Inoue, S.5
|