I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Sajeed, Shihan
46
results:
Search for persons
X
Format
Online (46)
Mediatypes
Articles (Online) (17)
Bookchapter (Online) (1)
OpenAccess-fulltext (28)
Sorted by: Relevance
Sorted by: Year
?
1
Quantum sensing: target detection with coherence:
, In:
2023 IEEE International Conference on Consumer Electronics (ICCE)
,
Sajeed, Shihan
;
Balaji, Bhashyam
;
Kirillova, Alex
. - p. 1-4 , 2023
Link:
https://doi.org/10.1109/..
?
2
An approach for security evaluation and certification of a ..:
Sajeed, Shihan
;
Chaiwongkhot, Poompong
;
Huang, Anqi
...
Scientific Reports. 11 (2021) 1 - p. , 2021
Link:
https://doi.org/10.1038/..
?
3
Observing quantum coherence from photons scattered in free-..:
Sajeed, Shihan
;
Jennewein, Thomas
Light: Science & Applications. 10 (2021) 1 - p. , 2021
Link:
https://doi.org/10.1038/..
?
4
Generalized efficiency mismatch attack to bypass the detect..:
Ruhul Fatin, M. A.
;
Sajeed, Shihan
Optics Express. 29 (2021) 11 - p. 16073 , 2021
Link:
https://doi.org/10.1364/..
?
5
Attacking quantum key distribution by light injection via v..:
Garcia-Escartin, Juan Carlos
;
Sajeed, Shihan
;
Makarov, Vadim
.
PLOS ONE. 15 (2020) 8 - p. e0236630 , 2020
Link:
https://doi.org/10.1371/..
?
6
Correction: Attacking quantum key distribution by light inj..:
Garcia-Escartin, Juan Carlos
;
Sajeed, Shihan
;
Makarov, Vadim
PLOS ONE. 15 (2020) 12 - p. e0244010 , 2020
Link:
https://doi.org/10.1371/..
?
7
Bright-light detector control emulates the local bounds of ..:
Sajeed, Shihan
;
Sultana, Nigar
;
Lim, Charles Ci Wen
.
Scientific Reports. 10 (2020) 1 - p. , 2020
Link:
https://doi.org/10.1038/..
?
8
Eavesdropper's ability to attack a free-space quantum-key-d..:
Chaiwongkhot, Poompong
;
Kuntz, Katanya B.
;
Zhang, Yanbao
...
Physical Review A. 99 (2019) 6 - p. , 2019
Link:
https://doi.org/10.1103/..
?
9
Eavesdropping and countermeasures for backflash side channe..:
Pinheiro, Paulo Vinicius Pereira
;
Chaiwongkhot, Poompong
;
Sajeed, Shihan
...
Optics Express. 26 (2018) 16 - p. 21020 , 2018
Link:
https://doi.org/10.1364/..
?
10
Publisher Correction: Invisible Trojan-horse attack:
Sajeed, Shihan
;
Minshull, Carter
;
Jain, Nitin
.
Scientific Reports. 7 (2017) 1 - p. , 2017
Link:
https://doi.org/10.1038/..
?
11
Invisible Trojan-horse attack:
Sajeed, Shihan
;
Minshull, Carter
;
Jain, Nitin
.
Scientific Reports. 7 (2017) 1 - p. , 2017
Link:
https://doi.org/10.1038/..
?
12
Creation of backdoors in quantum communications via laser d..:
Makarov, Vadim
;
Bourgoin, Jean-Philippe
;
Chaiwongkhot, Poompong
...
Physical Review A. 94 (2016) 3 - p. , 2016
Link:
https://doi.org/10.1103/..
?
13
Insecurity of Detector-Device-Independent Quantum Key Distr..:
Sajeed, Shihan
;
Huang, Anqi
;
Sun, Shihai
...
Physical Review Letters. 117 (2016) 25 - p. , 2016
Link:
https://doi.org/10.1103/..
?
14
Security loophole in free-space quantum key distribution du..:
Sajeed, Shihan
;
Chaiwongkhot, Poompong
;
Bourgoin, Jean-Philippe
...
Physical Review A. 91 (2015) 6 - p. , 2015
Link:
https://doi.org/10.1103/..
?
15
Publisher's Note: Attacks exploiting deviation of mean phot..:
Sajeed, Shihan
;
Radchenko, Igor
;
Kaiser, Sarah
...
Physical Review A. 91 (2015) 4 - p. , 2015
Link:
https://doi.org/10.1103/..
1-15