1
The Quantum Internet [E-Book] : Ultrafast and Safe from Hackers /
2
Near-Field-Mediated Photon-Electron Interactions [E-Book] /
3
Physics and theoretical computer science : from numbers and languages to (quantum) cryptography security [E-Book] /
4
Quantum Mechanics [E-Book] : A Modern and Concise Introductory Course /
5
Quantum Squeezing [E-Book] /
Table of Contents: ..., Entanglement and Quantum Cryptography....

Full text 
6
Beyond Fear [E-Book] : Thinking Sensibly About Security in an Uncertain World /
7
Quantum Information with Continuous Variables [E-Book] /
Table of Contents: ... phenomenon -- III Continuous Variable Optical-Atomic Interfacing -- 18. Atomic continuous variable processing and light-atoms quantum interface -- IV Limits on Quantum Information and Cryptography -- 19. Limitations on discrete quantum information and cryptography...

Full text 
8
Advances in Solid State Physics [E-Book] /
Table of Contents: ... -- Interacting Neural Networks and Cryptography -- Low Energy Dynamics in Glasses Investigated by Neutron Inelastic Scattering -- Magnetism -- Metallic Magnetism -- Domain State Model for Exchange Bias: Influence of Structural Defects on Exchange Bias in Co/CoO...

Full text 
9
Quantum Communication, Computing, and Measurement 2 [E-Book] /
Table of Contents: ... Macroscopic Schrödinger Cat -- Quantum Teleportation and Cryptography -- Free-Space Quantum Cryptography -- Parametric Schroedinger Cat with No Decoherence -- Quantum Cryptography Via Parametric Downconversion -- Dim Coherent States as Signal States in the Bb84...

Full text 
10
Quantum Communication, Computing, and Measurement 3 [E-Book] /
Table of Contents: ... Quantum Computers -- Optical Qubit Using Linear Elements -- Atom Chips -- Decoherence and Fidelity of Single Qubit Operations in a Solid State Quantum Computer -- Cryptography -- Long Distance Entangled State Quantum Key Distribution -- Bunching...

Full text 
11
Quantum [Un]speakables [E-Book] : From Bell to Quantum Information /
12
Coherent atomic matter waves [E-Book] : 27 July–27 August 1999 /
13
Decoherence: Theoretical, Experimental, and Conceptual Problems [E-Book] : Proceeding of a Workshop Held at Bielefeld, Germany, 10–14 November 1998 /
Table of Contents: ... Localization and Decoherence -- Quantum Cryptography and Long Distance Bell Experiments: How to Control Decoherence -- Exploration of the Fundamentals of Quantum Mechanics by Charged Particle Interferometry -- Alternative Approaches -- Single Ions in Paul Traps...

Full text 
14
The Quantum Mechanics Solver [E-Book] : How to Apply Quantum Theory to Modern Physics /
Table of Contents: ... in Crossed Fields -- 9. Exact Results for the Three-Body Problem -- 10. Analysis of a Stern—Gerlach Experiment -- 11. Measuring the Electron Magnetic Moment Anomaly -- 12. Neutron Interferometry -- 13. The Penning Trap -- 14. Quantum Cryptography -- 15. Hidden...

Full text 
15
The Physics of Quantum Information [E-Book] : Quantum Cryptography, Quantum Teleportation, Quantum Computation /
Table of Contents: ...1. The Physics of Quantum Information: Basic Concepts -- 2. Quantum Cryptography -- 3. Quantum Dense Coding and Quantum Teleportation -- 4. Concepts of Quantum Computation -- 5. Experiments Leading Towards Quantum Computation -- 6. Quantum Networks...

Full text 
16
Nonlocality in Quantum Physics [E-Book] /
Table of Contents: ... and Cryptography -- 15.1 Greenberger et al. example -- 15.2 Hardy’s example -- 15.3 Negative experiments. Elitzur-Vaidman proposal -- 15.4 Delayed choice experiments -- 15.5 Quantum erasers -- 15.6 Quantum cryptography -- 15.7 Teleportation -- References -- 16. Where...

Full text 
17
International Trends in Optics and Photonics [E-Book] : ICO IV /
Table of Contents: ... -- Optical Communication (Photonics and Optoelectronics) -- All-Optical Regeneration for Global-Distance Fiber-Optic Communications -- Non-quantum Cryptography for Secure Optical Communications -- Optical Materials and Processing -- Pulsed Laser Deposition...

Full text 
18
Number Theory in Science and Communication [E-Book] : With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity /
Table of Contents: .... Diophantine Equations -- 8. The Theorems of Fermat, Wilson and Euler -- IV. Cryptography and Divisors -- 9. Euler Trap Doors and Public-Key Encryption -- 10. The Divisor Functions -- 11. The Prime Divisor Functions -- 12. Certified Signatures -- 13. Primitive Roots...

Full text 
19
New Developments on Fundamental Problems in Quantum Physics [E-Book] /
Table of Contents: ... Sources -- 44. Bell’s Inequality for a Particle -- 45. Quantum Gravity Corrections for the Initial State of Gravitons -- 46. Quantum Privacy Amplification: A Secure Method for Cryptography -- 47. The Program of Local Hidden Variables -- 48. Noninvariant...

Full text 
20
Light Scattering and Photon Correlation Spectroscopy [E-Book] /
Table of Contents: ... the polysaccharides of starch -- Statistics and Data Processing -- Spatial photon correlation and statistics of nonlinear processes in nonlinear waveguides -- Photon correlation of correlated photons: experimental aspects of quantum cryptography and computation -- New opto...

Full text