ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
19
views
0
references
Top references
cited by
45
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,588
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate
Author(s):
G J Dynes
,
Ronald Dixon
,
Emily J. Shields
,
Tom Yuan
,
Laura J. Sharpe
Publication date:
2008
Journal:
Optics Express
Publisher:
The Optical Society
Read this article at
ScienceOpen
Publisher
Further versions
oa journal (via doaj)
oa repository (via OAI-PMH doi match)
Powered by
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Renewable Energy – Distribution Grid
Author and article information
Journal
DOI::
10.1364/OE.16.018790
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,588
Analysis of protein-protein docking decoys using interaction fingerprints: application to the reconstruction of CaM-ligand complexes
Authors:
Nobuyuki Uchikoga
,
Takatsugu Hirokawa
Conserved Fever Pathways across Vertebrates: A Herpesvirus Expressed Decoy TNF-α Receptor Delays Behavioral Fever in Fish
Authors:
Krzysztof Rakus
,
Maygane Ronsmans
,
Maria Forlenza
…
Practical decoy-state quantum secure direct communication
Authors:
X Liu
,
Xin Liu
,
Zijian Li
…
See all similar
Cited by
45
Secure quantum key distribution
Authors:
Hoi-Kwong Lo
,
Marcos Curty
,
Kiyoshi Tamaki
Tight finite-key analysis for quantum cryptography
Authors:
Marco Tomamichel
,
Charles Lim
,
Nicolas Gisin
…
Concise security bounds for practical decoy-state quantum key distribution
Authors:
Charles Lim
,
Marcos Curty
,
Nino Walenta
…
See all cited by
Version 1
Version 1