Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of quantum key distribution protocols in the perspective of smart grid communication security
Smart grid depends on an advanced communication network to collect information from the
power grid, and to disseminate control commands to the control devices. To safeguard the …
power grid, and to disseminate control commands to the control devices. To safeguard the …
Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd)
Quantum computing is a game-changing technology that affects modern cryptography and
security systems including distributed energy resources (DERs) systems. Since the new …
security systems including distributed energy resources (DERs) systems. Since the new …
Effect of external magnetic fields on practical quantum random number generator
YH Li, YY Fei, WL Wang, XD Meng, H Wang… - EPJ Quantum …, 2023 - epjqt.epj.org
Quantum random number generator (QRNG) based on the inherent randomness of
fundamental quantum processes can provide provable true random numbers which play an …
fundamental quantum processes can provide provable true random numbers which play an …
Practical twin-field quantum key distribution parameter optimization based on quantum annealing algorithm
Y Li, Z Sun, H Wang, K Shi, J Li, C Liu… - Quantum Science and …, 2024 - iopscience.iop.org
Twin-field quantum key distribution (TF-QKD) is widely studied since it can surpass the key
capacity of repeaterless QKD, whereas electromagnetic interference (EMI) is one of the main …
capacity of repeaterless QKD, whereas electromagnetic interference (EMI) is one of the main …
Parameters Optimization of Decoy-State Phase-Matching Quantum Key Distribution Based on the Nature-Inspired Algorithms
C Liu, Y Li, H Wang, K Shi, D Ma, Y Zhang… - Chinese Physics …, 2025 - iopscience.iop.org
Phase-matching quantum-key distribution (PM-QKD) has achieved significant results in
various practical applications. However, real-time communication requires dynamic …
various practical applications. However, real-time communication requires dynamic …
Performance optimization of decoy-state BB84-and MDI-QKD protocol and their key integrating application strategy for power dispatching
Quantum cryptography is an effective means to improve the information security level of
power dispatch data networks. From the perspective of quantum key supply and demand …
power dispatch data networks. From the perspective of quantum key supply and demand …
Decoy-state reference-frame-independent quantum key distribution with both source errors and statistical fluctuations
Reference-frame-independent quantum key distribution (RFI QKD) can generate secret keys
without the alignment of reference frames, which is very robust in real-life implementations of …
without the alignment of reference frames, which is very robust in real-life implementations of …
Time–energy high-dimensional one-side device-independent quantum key distribution
HZ Bao, WS Bao, Y Wang, RK Chen, HX Ma… - Chinese …, 2017 - iopscience.iop.org
Compared with full device-independent quantum key distribution (DI-QKD), one-side device-
independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In …
independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In …
Photonic generation of frequency-quadrupling millimeter-wave signals using polarization property
We propose and analyze a photonic method of generating frequency-quadrupling millimeter-
wave signal. This scheme is realized by using a single LiNbO 3 intensity modulator (IM) and …
wave signal. This scheme is realized by using a single LiNbO 3 intensity modulator (IM) and …
Emerging data encryption methods applicable to Energy Internet
Abstract Information exchange through the communication network is an indispensable part
of the Energy Internet. Any intentional or unintentional disclosure of stored and transmitted …
of the Energy Internet. Any intentional or unintentional disclosure of stored and transmitted …