Quantum identity authentication without entanglement P Zawadzki Quantum Information Processing 18 (1), 7, 2019 | 59 | 2019 |
Security of ping-pong protocol based on pairs of completely entangled qudits P Zawadzki Quantum Information Processing 11 (6), 1419-1430, 2012 | 31 | 2012 |
Increasing the security of the ping–pong protocol by using many mutually unbiased bases P Zawadzki, ZP Puchała, JA Miszczak Quantum Information Processing 12 (1), 569-575, 2013 | 21 | 2013 |
Improving security of the ping-pong protocol P Zawadzki Quantum Information Processing 12 (1), 149-155, 2013 | 13 | 2013 |
Formation of heavy quasiparticles and singlet superconductivity in the periodic Anderson model J Zieliński, P Zawadzki Zeitschrift für Physik B Condensed Matter 72 (2), 261-264, 1988 | 12 | 1988 |
An improved control mode for the ping-pong protocol operation in imperfect quantum channels P Zawadzki Quantum Information Processing 14, 2589-2598, 2015 | 8 | 2015 |
THE PING-PONG PROTOCOL WITH A PRIOR PRIVACY AMPLIFICATION P ZAWADZKI International Journal of Quantum Information 10 (3), 1250032, 2012 | 8 | 2012 |
Eavesdropping on quantum secure direct communication in quantum channels with arbitrarily low loss rate P Zawadzki Quantum Information Processing 15 (4), 1731-1741, 2016 | 7 | 2016 |
Advances in quantum secure direct communication P Zawadzki IET Quantum Communication 2 (2), 54-62, 2021 | 5 | 2021 |
A fine estimate of quantum factorization success probability P ZAWADZKI International Journal of Quantum Information 8 (8), 1233, 2010 | 4 | 2010 |
A numerical simulation of quantum factorization success probability P Zawadzki Internet–Technical Development and Applications, 223-231, 2009 | 4 | 2009 |
A General Scheme for Information Interception in the Ping-Pong Protocol P Zawadzki, JA Miszczak Advances in Mathematical Physics 2016 (http://dx.doi.org/10.1155/2016 …, 2016 | 3 | 2016 |
Młodość jako ryzyko PW Zawadzki Problemy Polityki Społecznej. Studia i Dyskusje, 2012 | 3 | 2012 |
Numerical estimation of the quantum factorization effectiveness P Zawadzki Theoretical and Applied Informatics 22 (1), 63-72, 2010 | 3 | 2010 |
Matlab i podstawy telekomunikacji J Izydorczyk, A Dustor, G Dziwoki, P Kłosowski, W Sułek, W Więcławek, ... Helion, 2017 | 2 | 2017 |
New View of Ping-Pong Protocol Security P Zawadzki Chinese Physics Letters 29 (1), 010301, 2012 | 2 | 2012 |
Ochrona informacji w bezprzewodowych sieciach LAN P Zawadzki Przegląd Telekomunikacyjny+ Wiadomości Telekomunikacyjne, 408-413, 2005 | 2 | 2005 |
Effective noise estimation for secure quantum direct communication over imperfect channels P Zawadzki Computer Networks: 21st International Conference, CN 2014, Brunów, Poland …, 2014 | 1 | 2014 |
An analysis of the ping-pong protocol operation in a noisy quantum channel P Zawadzki Computer Networks: 20th International Conference, CN 2013, Lwówek Śląski …, 2013 | 1 | 2013 |
Closed-form formula on quantum factorization effectiveness P Zawadzki Quantum Information Processing 12 (1), 97-108, 2013 | 1 | 2013 |