[1] Nikolopoulos G.M,Alber G.Security bound of two-basis quantum-key-distribution protocols using qudits[J].Phys.Rev.A,2005,72(3):032320-1
[2] Grassard G,Lutkenhaus N,Mor T et al..Limitations on practical quantum cryptography[J].Phys.Rev.Lett.,2000,85(6):1330-1333
[3] Niederberger A,Scarani V,Gisin N.Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum ryptography[J].Phys.Rev.A,2005,71(4):042316-1
[4] Fu Mingxing.Influence of path-attack on security of quantum key distribution networks[J].Chinese J.Quant.Electron.,2008,25(5):572-576
[5] Zhao Shengmei,Li Fei,Zheng Baoyu.The security of quantum key distribution under probabilistic clone/resend attack[J].Journal of Electronics&Information Technology,2005,27(10):1639-1642
[6] Lo H.K,Ma X.F,Chen K.Decoy state quantum key distribution [J].Phys.Rev.Lett.,2005,94(23):230504
[7] Xiangbin Wang.Beating the photon-number-splitting attack in practical quantum cryptography[J].Phys.Rev.Lett.,2005,94(23):230503-1
[9] Jian Peng,Yifei Fu,Xudong Shang.Quick single-photon detector with many avalanche photo diodes working on the time division [J].Chin.Opt.Lett.,2008,6( 5):320-322