Secure quantum key distribution using squeezed states
Secure quantum key distribution with an uncharacterized source
Secure Quantum Passwords
Secure Quantum Secret Sharing Based on Reusable GHZ States as Secure Carriers
Secure quantum string seal exists
Secure Quantum Telephones
Secure Reusable Base-String in Quantum Key Distribution
Secure self-calibrating quantum random bit generator
Secure sharing of random bits over the Internet
Secure two-party quantum evaluation of unitaries against specious adversaries
Securing a Quantum Key Distribution Network Using Secret Sharing
Securing QKD Links in the Full Hilbert Space
Securing quantum bit commitment through reverse quantum communication
Security against eavesdropping in quantum cryptography
Security against individual attacks for realistic quantum key distribution
Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases
Security Analysis of an Untrusted Source for Quantum Key Distribution: Passive Approach
Security analysis of decoy state quantum key distribution incorporating finite statistics
Security analysis of the time-coding quantum key distribution protocols
Security and Composability of Randomness Expansion from Bell Inequalities