Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum network communication: the butterfly and beyond., , and . IEEE Trans. Inf. Theory, 56 (7): 3478-3490 (2010)General Paradigm for Distilling Classical Key From Quantum States., , , and . IEEE Trans. Inf. Theory, 55 (4): 1898-1929 (2009)A derivation (and quantification) of the third law of thermodynamics, and . (2014)cite arxiv:1412.3828Comment: 6 pages+appendix, 2 figures.A Resource Theory for Work and Heat., , and . CoRR, (2016)Anomalous contribution to galactic rotation curves due to stochastic spacetime, and . (2024)Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof., , , , , and . IEEE Trans. Inf. Theory, 55 (7): 3375-3387 (2009)Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity., , , , and . IEEE Trans. Inf. Theory, 54 (6): 2604-2620 (2008)Gravitationally induced decoherence vs space-time diffusion: testing the quantum nature of gravity, , , and . Nature Communications, 14 (1): 7910 (Dec 4, 2023)The Universal Composable Security of Quantum Key Distribution., , , , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 386-406. Springer, (2005)Implementing a Quantum Computation by Free Falling. Science, 311 (5764): 1106--1107 (Feb 24, 2006)