Secure and efficient decoy-state quantum key distribution with inexact pulse intensities
Secure assisted quantum computation
Secure Bidirectional Communication Protocol without Quantum Channel
Secure Classical Bit Commitment using Fixed Capacity Communication Channels
Secure Coherent-state Quantum Key Distribution Protocols with Efficient Reconciliation
Secure communication using coherent states
Secure Communication using Gaussian-State Quantum Illumination
Secure communication using mesoscopic coherent states
Secure Communication Using Qubits
Secure communication with a publicly known key
Secure communication with single-photon two-qubit states
Secure Controlled Teleportation
Secure Deterministic Communication Without Entanglement
Secure device-independent quantum key distribution with causally independent measurement devices
Secure direct bidirectional communication protocol using the Einstein-Podolsky-Rosen pair block
Secure Direct Communication based on Ping-pong Protocol
Secure Direct Communication Based on Secret Transmitting Order of Particles
Secure direct communication using Einstein-Podolsky-Rosen pairs and teleportation
Secure direct communication using entanglement
Secure direct communication using step-split Einstein-Podolsky-Rosen pair