[1] Ekert A K. Quantum cryptography based on Bell's theorem [J].Phys. Rev. Lett.,1991,67: 661-663.
[2] Bennett C H,et al. Communication via one-and two-particle operators on einstein-podolsky-rosen states [J].Phys. Rev. Lett.,1992,69: 2881-2884.
[3] Bennett C H,Brassard G,et al. Teleporting an unknown quantum state via dual classical and einstein-podolskyrosen channels [J].Phys. Rev. Lett.,1993,70: 1895-1899.
[5] Shor P W. Scheme for reducing decoherence in quantum computer memory [J].Phys. Rev. A,1995,52: R2493-R2496 .
[6] Gottesman D,Chuang I L. Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations [J].Nature,1999,402: 390-393.
[8] Vedral V. Entanglement of pure states for a single copy [J].Phys. Rev. Lett.,1999,83: 1046-1049.
[9] Min C,Shiqun Z. Thermal entanglement between alternate qubits of a four-qubit Heisenberg XX chain in a magnetic field [J].Phys. Rev. A,2005,71: 034311-0343114.
[10] Rong Z,Shiqun Z. Thermal entanglement in a two Heisenberg XY chain in a magnetic field [J].Phys. Lett. A,2006,348: 110-118.
[11] Xiaoguang W. Entanglement in the quantum Heisenberg XY model [J].Phys. Rev. A,2001,64: 012313-012319.
[12] Wootters W K. Entanglement of formation of an arbitrary state of two qubits [J].Phys. Rev. Lett.,1998,80:2245-2248.