From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantum network communication: the butterfly and beyond., , и . IEEE Trans. Inf. Theory, 56 (7): 3478-3490 (2010)General Paradigm for Distilling Classical Key From Quantum States., , , и . IEEE Trans. Inf. Theory, 55 (4): 1898-1929 (2009)A Resource Theory for Work and Heat., , и . CoRR, (2016)A derivation (and quantification) of the third law of thermodynamics, и . (2014)cite arxiv:1412.3828Comment: 6 pages+appendix, 2 figures.Anomalous contribution to galactic rotation curves due to stochastic spacetime, и . (2024)Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity., , , , и . IEEE Trans. Inf. Theory, 54 (6): 2604-2620 (2008)Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof., , , , , и . IEEE Trans. Inf. Theory, 55 (7): 3375-3387 (2009)Gravitationally induced decoherence vs space-time diffusion: testing the quantum nature of gravity, , , и . Nature Communications, 14 (1): 7910 (04.12.2023)The Universal Composable Security of Quantum Key Distribution., , , , и . TCC, том 3378 из Lecture Notes in Computer Science, стр. 386-406. Springer, (2005)How to reuse a one-time pad and other notes on authentication encryption and protection of quantum information, и . CoRR, (2003)