Web Server Statistics for VM's sites

Program started at Sun-24-Jun-2018 00:21.
Analysed requests from Mon-26-Mar-2018 00:00 to Sat-23-Jun-2018 23:59 (90.00 days).

General Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report contains overall statistics.

Figures in parentheses refer to the 7-day period ending 24-Jun-2018 00:21.

Successful requests: 592,491 (25,010)
Average successful requests per day: 6,583 (3,572)
Successful requests for pages: 383,718 (9,014)
Average successful requests for pages per day: 4,263 (1,287)
Failed requests: 9,307 (573)
Redirected requests: 25,572 (2,369)
Distinct files requested: 214,976 (5,960)
Distinct hosts served: 31,396 (3,177)
Corrupt logfile lines: 357
Unwanted logfile entries: 446,468
Data transferred: 83.60 gigabytes (4.47 gigabytes)
Average data transferred per day: 951.21 megabytes (654.50 megabytes)

Monthly Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each month.

Each unit (+) represents 5,000 requests for pages or part thereof.

monthreqspages 
Mar 2018121047110450+++++++++++++++++++++++
Apr 201815776175453++++++++++++++++
May 201810217635379++++++++
Jun 2018211507162436+++++++++++++++++++++++++++++++++

Busiest month: Jun 2018 (162,436 requests for pages).

Weekly Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each week.

Each unit (+) represents 3,000 requests for pages or part thereof.

week beg.reqspages 
25/Mar/18121047110450+++++++++++++++++++++++++++++++++++++
1/Apr/185033725449+++++++++
8/Apr/183739521024++++++++
15/Apr/183427017947++++++
22/Apr/18294748497+++
29/Apr/18213597641+++
6/May/18221097320+++
13/May/18237337973+++
20/May/18229508742+++
27/May/18245678378+++
3/Jun/1810051184842+++++++++++++++++++++++++++++
10/Jun/187970666434+++++++++++++++++++++++
17/Jun/18250339021++++

Busiest week: week beginning 25/Mar/18 (110,450 requests for pages).

Daily Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each day.

Each unit (+) represents 800 requests for pages or part thereof.

datereqspages 
13/May/1845511818+++
14/May/1836701038++
15/May/1834331045++
16/May/182786833++
17/May/1838051063++
18/May/182716979++
19/May/1827721197++
    
20/May/182417945++
21/May/183053862++
22/May/183285996++
23/May/1832641017++
24/May/1841791944+++
25/May/1839832111+++
26/May/182769867++
    
27/May/1841961264++
28/May/183394739+
29/May/1836731072++
30/May/1839711815+++
31/May/1830761349++
1/Jun/1836371410++
2/Jun/182620729+
    
3/Jun/1836951727+++
4/Jun/183519815++
5/Jun/182964701+
6/Jun/1842591463++
7/Jun/182658624391+++++++++++++++++++++++++++++++
8/Jun/182986827990+++++++++++++++++++++++++++++++++++
9/Jun/182962027755+++++++++++++++++++++++++++++++++++
    
10/Jun/182656924873++++++++++++++++++++++++++++++++
11/Jun/182496024134+++++++++++++++++++++++++++++++
12/Jun/181586913625++++++++++++++++++
13/Jun/183970914++
14/Jun/183630936++
15/Jun/182042959++
16/Jun/182666993++
    
17/Jun/1830511160++
18/Jun/1845841013++
19/Jun/1832801082++
20/Jun/183362980++
21/Jun/182851916++
22/Jun/182961883++
23/Jun/1849442987++++

Busiest day: 26/Mar/18 (34,479 requests for pages).

Daily Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the total activity for each day of the week, summed over all the weeks in the report.

Each unit (+) represents 2,000 requests for pages or part thereof.

dayreqspages 
Sun6964344045+++++++++++++++++++++++
Mon10633874555++++++++++++++++++++++++++++++++++++++
Tue8976557822+++++++++++++++++++++++++++++
Wed8184150728++++++++++++++++++++++++++
Thu8496156610+++++++++++++++++++++++++++++
Fri7815451215++++++++++++++++++++++++++
Sat8178948743+++++++++++++++++++++++++

Hourly Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the total activity for each hour of the day, summed over all the days in the report.

Each unit (+) represents 500 requests for pages or part thereof.

hourreqspages 
02434316458+++++++++++++++++++++++++++++++++
12701519098+++++++++++++++++++++++++++++++++++++++
22777219315+++++++++++++++++++++++++++++++++++++++
32795118491+++++++++++++++++++++++++++++++++++++
42750418424+++++++++++++++++++++++++++++++++++++
52648317243+++++++++++++++++++++++++++++++++++
62515916170+++++++++++++++++++++++++++++++++
72563116098+++++++++++++++++++++++++++++++++
82277214621++++++++++++++++++++++++++++++
92382915680++++++++++++++++++++++++++++++++
102455316361+++++++++++++++++++++++++++++++++
112292215676++++++++++++++++++++++++++++++++
122899215432+++++++++++++++++++++++++++++++
132346815142+++++++++++++++++++++++++++++++
142215214192+++++++++++++++++++++++++++++
152216314439+++++++++++++++++++++++++++++
162393314712++++++++++++++++++++++++++++++
172319814312+++++++++++++++++++++++++++++
182446415363+++++++++++++++++++++++++++++++
192605816406+++++++++++++++++++++++++++++++++
202308115133+++++++++++++++++++++++++++++++
212348415343+++++++++++++++++++++++++++++++
222238014384+++++++++++++++++++++++++++++
232318415225+++++++++++++++++++++++++++++++

Domain Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the countries of the computers which requested files.

Listing domains, sorted by the amount of traffic.

reqs%bytesdomain
592491100%[unresolved numerical addresses]

Organisation Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the organisations of the computers which requested files.

Listing the top 20 organisations by the number of requests, sorted by the number of requests.

reqs%bytesorganisation
23691815.44%88
48420 2.88%216.244
3007210.30%207.46
26523 9.20%157.55
13072 0.18%199.87
12523 6.24%40
12226 5.18%66.249
11216 1.29%54
9403 9.29%5
9101 1.21%34
8241 0.41%64.62
7261 0.16%212.44
7048 0.50%77
6211 1.98%52
6209 0.38%66.160
4224 0.77%99
3336 0.49%72
3336 0.35%109
3160 0.23%35
2916 0.29%82
13107533.21%[not listed: 5,930 organisations]

Host Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the computers which requested files.

Listing the top 50 hosts by the number of requests, sorted alphabetically.

reqs%byteshost
7375 8.96%5.255.250.129
1114 0.07%18.233.66.13
1106 0.07%34.201.174.238
993 0.06%34.203.29.200
2072 0.14%34.229.49.61
1009 0.07%35.153.18.44
1039 0.06%35.226.23.240
1012 0.06%52.3.243.41
988 0.06%52.201.219.236
965 0.06%52.206.228.92
958 0.06%52.207.74.144
979 0.06%54.144.83.193
967 0.06%54.152.50.154
1178 0.07%54.234.128.174
2094 0.13%64.62.252.162
1837 0.07%64.62.252.163
1112 0.04%64.62.252.164
3119 0.16%64.62.252.169
1321 0.08%66.160.140.180
1380 0.09%66.160.140.181
730 0.04%66.160.140.182
2776 0.17%66.160.140.183
1344 0.89%66.249.64.81
1189 0.99%66.249.64.83
1138 0.83%66.249.64.85
826 0.31%66.249.69.113
807 0.25%66.249.69.115
2610 0.31%72.142.79.238
984 0.09%82.80.230.228
863 0.01%88.99.250.15
23473415.03%88.198.158.233
2775 0.54%99.250.144.62
792 0.01%109.90.10.31
1378 0.55%157.55.39.123
1497 0.49%157.55.39.125
1148 0.32%157.55.39.200
953 0.27%157.55.39.202
952 0.24%157.55.39.203
895 0.20%157.55.39.204
1023 0.26%157.55.39.234
1429 0.02%195.154.44.62
13072 0.18%199.87.254.121
763 0.14%207.46.13.31
877 0.17%207.46.13.32
825 0.23%207.46.13.74
762 0.24%207.46.13.141
7261 0.16%212.44.16.158
20282 1.20%216.244.66.203
17757 1.05%216.244.66.235
10295 0.62%216.244.66.250
22713663.75%[not listed: 31,346 hosts]

Referrer Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the referrers (where people followed links from, or pages which included this site's images).

Listing referring URLs with at least 20 requests, sorted by the number of requests.

reqsURL
15532http://www.vad1.com/lab/
16  http://www.vad1.com/lab/?fb_locale=tr_TR
14677http://www.vad1.com/lab/pictures.html
142  http://www.vad1.com/lab/pictures.html?fb_locale=it_IT
128  http://www.vad1.com/lab/pictures.html?fb_locale=zh_CN
12027http://www.vad1.com/
5611https://www.google.com/
5038http://www.vad1.com/photo/dirty-scanner/
4632http://www.vad1.com/photo/dirty-scanner/ls2000-cleaning/
1919http://www.vad1.com/photo/family-archive/
1862http://www.vad1.com/spam.html
1694http://www.vad1.com/lab/people.html
1596http://www.vad1.com/lab/hacking-commercial-quantum-cryptography-2010/
1516http://www.vad1.com/photo/folldal/
1351https://www.bing.com/
1062http://www.vad1.com/korean-blog/index-ru.html
792https://www.schluesseldienst-bauer.de/
757https://www.google.no/
690http://www.vad1.com/lab/other.html
669http://go.mail.ru/search_images
647http://www.vad1.com/tcp-throughput-limit.html
643http://www.vad1.com/listfirm/optcomp.html
595http://www.vad1.com/lab/publications.html
590https://www.google.ru/
567https://www.google.se/
547http://www.vad1.com/photo/lights-trondheim/
530http://www.vad1.com/photo/sky/
513https://www.google.co.uk/
512http://www.vad1.com/photo/framing.html
483http://www.russia.no/
470http://www.vad1.com/photo/x-ray-exper.html
463https://www.google.co.in/
462http://www.vad1.com/lab/news-archive.html
448http://vad1.com/publications/
429https://www.google.ca/
422https://www.google.fi/
399http://www.vad1.com/lab/full-eavesdropping-2011/
385http://vad1.com/
385http://www.vad1.com/lab/press/
379http://www.vad1.com/publications/
372http://www.vad1.com/lab/presentations/
359http://www.vad1.com/photo/stock/1998.html
353https://www.google.it/
351http://www.vad1.com/photo/stock/2000.html
350https://www.google.de/
349http://www.vad1.com/photo/
322http://www.vad1.com/photo/stock/1999.html
318http://www.vad1.com/photo/ultimate-photo-shoot/
290http://www.vad1.com/photo/stock/
285https://www.google.com.br/
282http://yandex.ru/clck/jsredir
56  http://yandex.ru/clck/jsredir?bu=56mlpi&from=yandex.ru%3Byandsearch%3Bweb%3B%3B&text=&etext=1765.tATYoh62BxynU2yk-_p-TAkQaKv2Tz0Rft0gg-24UdNMiw41KLdCMdzQ832VUFO4ninyWW3n5nVcuQ6jy3_Zu02bkZOYpzLy2YMyqOwRGOargglvXgORXPfxvPRX-14q.bdf9c05c0f7d91c9e45c98efc40cc62975300e81&uuid=&state=H4h8uvWmGgzSQA8WTiQiw8biyXbKMlq7xk4uuYAwpJVJ5k90Dfc2CbM2hhfBxJbPTnBBrkDGyXSkexODTnaOSWJiacI-UwRWzQi0UTfltW4,&&cst=AiuY0DBWFJ7q0qcCggtsKSNMlrHnlP-bG1_s7m8bLW7hChKvML5tax_e6zbA2d9sqMNtTi6EUap4lzIebbtSJaWF1wGSk_YarhTIzqTAqr_pZ7ipLj-T_I_wiacx0a7pxyC_GBh7I61cOwsxssDxUExYeJnmzp4z3F0wrlTG_7qv9mS0RNZQcyUM9XguVW4HNh2cYQvqIdRTwCY5eAJ3OZ2RbRWBxvhPZCytkBpYIUW8h5rgdMAGPm2uLd7NlQrhpl3f2wRE_De8bZrOrTIxn2NyMLaGPvZKT3o-sy0Kgum7JnS5p6LI65D9SS59NBK90QhOjDos-et9aqPifLHFI9rhcEge2pLJrulY-k8DVzw,&data=UlNrNmk5WktYejR0eWJFYk1Ldmtxa01qTlRxU28wM3dkMWNHaV9adndoSFFjdF9XZkdTV3FrY3NnY2t5NGVXbHV2aV9fUTRLY2VkZFZmR01JNndiYy1WbHZaak9jSmRDTnpFQ3doVnk3SmN2NVVhNVVNSTc4Ums5VEhrT195c1k,&sign=9cf1ef090c3fdee10c6745a47b3f98bd&keyno=0&b64e=2&ref=orjY4mGPRjk5boDnW0uvlpAgqs5Jg3quM84KmdIKt3c,&l10n=ru&cts=1524472111929&mc=4.67720048818356
248http://www.vad1.com/photo/stock/2003.html
247http://www.russia.no/regional/index-ru.html
245http://www.russia.no/index-ru.html
240http://www.vad1.com/photo/moncal.html
233https://www.google.fr/
229http://image.baidu.com/search/detail
22  http://image.baidu.com/search/detail?ct=503316480&z=0&ipn=d&word=%E5%BD%BC%E5%BE%97%E5%A4%A7%E5%B8%9D&hs=0&pn=-1&spn=0&di=baikeimg&pi=&rn=1&tn=baiduimagedetail&is=&istype=&ie=utf-8&oe=utf-8&in=&cl=2&lm=-1&st=&lpn=0&ln=undefined&fr=&fmq=undefined&fm=undefined&ic=&s=&se=&sme=&tab=&width=&height=&face=&cg=&bdtype=0&oriquery=&objurl=http://b.hiphotos.baidu.com/baike/pic/item/3801213fb80e7bec2d78ccf0232eb9389b506b05.jpg&fromurl=http://baike.baidu.com/item/%E5%BD%BC%E5%BE%97%E4%B8%80%E4%B8%96/629058&gsm=&islist=&querylist=
227http://www.skyscrapercity.com/showthread.php
87  http://www.skyscrapercity.com/showthread.php?t=765974
61  http://www.skyscrapercity.com/showthread.php?t=1518698
17  http://www.skyscrapercity.com/showthread.php?t=580956
10  http://www.skyscrapercity.com/showthread.php?t=765974&page=13
225https://www.youtube.com/redirect
225  https://www.youtube.com/redirect?v=ToOLbdrWst4&event=video_description&redir_token=OOUxdIAdQ5BUbL319kF7ZwDAdTZ8MTUyMzkwNTk2NUAxNTIzODE5NTY1&q=http://www.vad1.com/lab/presentations/Makarov-20140801-IQC-short-course.pptx
224http://www.vad1.com/photo/autodof.html
216http://www.vad1.com/hosting.html
202http://www.vad1.com/lab/torbjoern/
200http://www.vad1.com/photo/folldal/index-ru.html
194https://www.google.es/
190http://www.vad1.com/continfo.html
183http://www.baidu.com/s
182http://www.vad1.com/photo/dirty-scanner/nikon-ls-2000-lubrication-guide.pdf
181http://www.vad1.com/bio.html
172http://www.vad1.com/photo/lights-trondheim/pg2.html
171https://www.google.com.au/
165http://www.vad1.com/lab/conferences.html
163http://vad1.com/lab/
158https://www.google.pl/
157https://www.google.co.kr/
150http://www.vad1.com/photo/esn/
149http://www.baidu.com/
146http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/
146http://artravelers.com/c/112054
144http://www.vad1.com/addcomment.html
142https://www.google.com.ua/
138https://www.google.nl/
132http://prespagsomys.soup.io/
124http://www.vad1.com/photo/stock/hi-res.html
122http://titempresra.soup.io/
121http://www.vad1.com/listfirm/
120https://cn.bing.com/
119http://www.pearsonimaging.com/articles/howto/ls5000cleaning.html
116http://igcamoustell.aircus.com/
114http://rechatrite.aircus.com/
113http://tuinfachnistni.aircus.com/
112https://duckduckgo.com/
109https://www.google.com.mx/
107http://linktampcorhy.aircus.com/
103https://www.google.com.ph/
102http://www.vad1.com/adhoc/20180409gvhgvrghfg/
102http://cossgybuftio.soup.io/
101http://erprolrepli.soup.io/
101http://www.vad1.com/photo/stock/2001.html
99http://www.militaar.net/phpBB2/viewtopic.php
89  http://www.militaar.net/phpBB2/viewtopic.php?f=30&t=6581
99http://tricaloxer.aircus.com/
98http://poteremonc.aircus.com/
95http://www.vad1.com/photo/spotmeter.html
94http://exsloverrai.aircus.com/
94https://www.google.co.jp/
93http://giondeltechdai.aircus.com/
92http://www.vad1.com/lab/lecture-fiber_components_course-20031113.pdf
92https://www.google.cz/
92https://www.google.com.ar/
90https://www.google.ch/
89https://www.csiac.org/
88http://www.vad1.com/listfirm/elcomp.html
87http://saigrisemec.soup.io/
86http://www.vad1.com/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-05.html
85http://lafiliral.soup.io/
85https://www.google.com.hk/
85http://www.vad1.com/photo/perfect-slide-exp.html
84https://yandex.ru/clck/jsredir
13  https://yandex.ru/clck/jsredir?bu=40mlxn&from=yandex.ru%3Bsearch/%3Bweb%3B%3B&text=&etext=1765.lVT_dVf1xi_4ILpYMrpSx3gpJ8765vl28txvacD3eajLjCVm_kcsq5UmGqFOQB1V9WhMdjZPWfSKEJF5EUdjnw_fu5po7JQ26e6rshqlERshYb3bnBSMtpdCOBB07OLq.c534d6da9f76139d58032e81b8f7dccd3cfe318d&uuid=&state=PEtFfuTeVD5kpHnK9lio9T6U0-imFY5IshtIYWJN7W-V64A9Yd8Kvy6D--ZSidWWMUwFopTJKniqqdqrxu7Ccy5iliIhiLL20CML06FrijYUFdzhitn37jBcYPfhgVPr&&cst=AiuY0DBWFJ5fN_r-AEszk69hhbXw31owyuqFuZWCaWypPWz6tHoeiINmQogFqvDuG0TEXSP5WzjZR8sN27or6PPnjcMzNJ1HALFJOqC465Nq5jQfY6gc08AdziXs9HIkJxxs0sTO7DG39QGFXH3mVGyZuttDvww9wOloQkKt2VLMBQzsrlqRNP6e3o5_u3uECVSkZpbxkh_-Th6CiZhAJursAWUZRM-JCl0yYMbipEicWQs4cKb9j0PUjnY1K379rNDOXT5Ub7xB6bEdV5ejDBsw7vsSDwKmGy2bpLrx6TwV0ZXyS9HOauw1Wl_GwE2r0e9tltuuX7jqOIHPIpYkLPR-GZl1XLZVBey8459TK2iJxlKjNiqhqRw7zOUsZ3ywjAfMyPlcr9TWDNuWoroSEal_PT6Q-mZK6bcaTxPNKhG-Y7MVlxpaMZ_48OSMCFjNnaZmWl7Pgfexd6FgF8p5nw0Moqc5XepMQFN42OhE6L1TG1-GG7AWunUKjTwP07Xh_tkaQC2fvSR6pZuokmCreIIPKl5zyxBd1paX27-YcAgi-OQaY2KYLJxzJtAFWrvJfjUJ8hmCiZCO299T3PhGM59rRRlXyGm3iEfTS6m5kEuXN7UgZF4jCF6PzRE9K6QjOgjabSVoCP6HRpfv51CD6qR7HTjVyYhifjDaQ5Eod_3lb2_ooGURKeRRi8ovgq-gLovA6Hru_yjYcP8qD5_yMbQ4C0GuJlZTivRvgtezEvmSSugiXK44rxu9I30LATOmvu1dAEh8lkD_rLqiwdY877udiBc7h86UBZKuINwx-HGsExY2FTBNYCuHu7WusD15in9yr-idumTvYU8sqWtn6OFNJPbsNQE9QWYsOFKxWF3SgdMjI07MI4FRy0ba9bgqE4Jpu3HP9hs,&data=UlNrNmk5WktYejR0eWJFYk1Ldmtxa01qTlRxU28wM3dkMWNHaV9adndoSFFjdF9XZkdTV3FrY3NnY2t5NGVXbHV2aV9fUTRLY2VkZFZmR01JNndiYzRnaG1teS05bGo1NS1rR2RsZUw3SXUzZkVfRDNCTFg2OXp3M1RNQ0h3cmo,&sign=e4fb03be586edcad4672f9f28adfe0d9&keyno=0&b64e=2&ref=orjY4mGPRjk5boDnW0uvlrrd71vZw9kpjly_ySFdX80,&l10n=ru&cts=1524466586664&mc=4.964902315121632
10  https://yandex.ru/clck/jsredir?bu=3lg1uq&from=yandex.ru%3Bsearch/%3Bweb%3B%3B&text=&etext=1801.qSlxcKRlgFP5eemfCJmO6u4BTec5nRWm2FZHFdqdEeBmMsHkbU13Jw49gLMlV2sAEzUV-08RJeBbYK4icLdwgVJ5oFZs1JfmQ9jM7IML84cf1rDY3NciZnYzraU87JJfGtaN9fOyVQ1HO-YtVUk21Q.777bdf107b21f9445a4d6281f856d2d45a42a77f&uuid=&state=PEtFfuTeVD5kpHnK9lio9T6U0-imFY5IshtIYWJN7W-V64A9Yd8Kvy6D--ZSidWWMUwFopTJKniqqdqrxu7Ccy5iliIhiLL20CML06FrijYUFdzhitn37jBcYPfhgVPr&&cst=AiuY0DBWFJ5fN_r-AEszk69hhbXw31owyuqFuZWCaWypPWz6tHoeiPUZlciWbmxFh-UgsVdPwFA-gtc_uG1twGPVviJmwro4VCIXEuN63aXLcv7NK4dRpk2PhG5BX7YawIUKKtUGMDMOdXjhqdAxDJn5QOrcNGbbnUpc3Dk0CLQM2e5z9OB7gUv3B-bNPm5dZyAR4TjiRgaJ411Ebd1T2hKZI9hZAEx1RZyc3OVtJD1d70f1J2q9SIiAF7oLym6PYnlr-LPZOgEHhk9-8sL5fbube4ZFgY1yhgIziusOhdaliy_Lg4QmkZASWHWjT9sa92GBgeFn42fySoRF8R3ou9O8wmQBf63Q-33JYB2A8MbnAqPi72rRvYHr8cWg8CBsMdbN13iVS5HjdmyKpXKPWa7YNWRgEAzAlK83Xsnqo0Jjpxl_8m1sO7SDUfpdJVwVt94ttftHsqD_0CVwt11BzhLbnCT9C6yhT1zpZq-sQ9aK4Fg_piMb6IB_S7Myd-Qj4FmOWKhgUyixYuR0GyGFI6WfS9bBacQiX7di0WtyWhxmWQElTE1euhLd1DBGFn4livaRjsl3a3GO5SwQu72rIsrg6uP7dkd5TdZMX8a8jo9vWulVaeng1vckfFHXBjAfPWNuxgVvaC0l50nV2_NfSUrhwEScRw3ODlplqC057pD_ld6y6HyOYQVfLTZN6UfqXpNYRXnhlvpaWoNKbFOCF0tu2a-h9c9Sfwt0bquuj_NU30IZQAHiIASBk8jzAZGzylc01wOLIoLIolGEmJaaLyAy-kEgXSUobczkAP9oADWYBt-kM2maR2fKHwumZ4AT6yYZvo1qz9ymfzgpUKbR9H-oKdTg9jPEX1E7VtEgTfIm0h6ZfmXUEtRbN2otulrq&data=UlNrNmk5WktYejR0eWJFYk1Ldmtxa01qTlRxU28wM3dkMWNHaV9adndoSFFjdF9XZkdTV3FrY3NnY2t5NGVXbHV2aV9fUTRLY2VkZFZmR01JNndiYy1PVlVJRjBQQ05pWlBPMlJKSHhGSlpLTFNMVVZpaFVyY0REbGJDN0lsZUQ,&sign=1b2a38467eb2eb8d1952a5a53ffe1a12&keyno=0&b64e=2&ref=orjY4mGPRjk5boDnW0uvlrrd71vZw9kpjly_ySFdX80,&l10n=ru&cts=1527519851461&mc=5.76087466364812
84https://www.google.com.tr/
83https://www.google.pt/
82https://www.google.ro/
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/people.html
81https://www.google.com.sg/
80http://plananmitdo.soup.io/
80http://soyditope.soup.io/
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/pictures/publications.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/pictures/20170930-St-Petersburg-mushroom-picking.jpg
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
79http://www.vad1.com/photo/lights-trondheim/pg3.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/pictures/pictures/20160518-Garcia-Escartin-in-labQNC3303.jpg
75https://www.youtube.com/
74http://orthodoxy-rainbow.blogspot.gr/search/label/%CE%9D%CE%BF%CF%81%CE%B2%CE%B7%CE%B3%CE%AF%CE%B1
73http://www.vad1.com/photo/winners/
72http://vad1.com/lab/full-eavesdropping-2011/
71https://www.google.com.tw/
70https://www.taringa.net/posts/info/3197153/La-internacional--el-himno-de-los-trabajadores-del-mundo.html
70http://www.vad1.com/photo/stock/2009.html
68https://www.google.co.id/
68https://www.google.be/
67http://www.vad1.com/photo/ultimate-photo-shoot/group.html
66http://www.vad1.com/photo/stock/2002.html
65http://militaar.net/phpBB2/viewtopic.php
64  http://militaar.net/phpBB2/viewtopic.php?f=30&t=6581
63http://www.shtengel.com/gleb/Scanners.htm
62https://www.google.co.th/
62https://www.google.dk/
62https://www.google.hu/
61https://www.google.gr/
60http://www.vad1.com/photo/phd-defence-20070430/
58http://www.google.com/
57http://www.vad1.com/manuals/
57http://www.vad1.com/lab/kirill/diploma.pdf
57http://www.vad1.com/photo/stock/n11-15.html
56http://www.vad1.com/photo/family-archive/20121212-Makarov.html
56http://www.russia.no/regional/
55http://www.vad1.com/publications/phd-thesis-makarov-200703-photos300dpi.pdf
54http://www.orthodoxchristianity.net/forum/index.php
54  http://www.orthodoxchristianity.net/forum/index.php?topic=66471.45
54https://www.google.ee/
53http://cdweather.boards.net/thread/45/members
12  http://cdweather.boards.net/thread/45/members?page=1
52http://www.vad1.com/photo/equipment.html
52https://www.google.co.il/
52http://orthodoxy-rainbow.blogspot.be/search/label/%CE%9D%CE%BF%CF%81%CE%B2%CE%B7%CE%B3%CE%AF%CE%B1
52http://kjernen.com/forum/ubbthreads.php/ubb/showflat/Number/160916
52http://www.vad1.com/lab/artem/
52http://66.39.24.47/
51http://www.vad1.com/photo/stock/n65-35.html
50http://www.vad1.com/stats/
50https://www.google.com.eg/
47https://www.google.com.co/
46http://www.google.com/url
46https://www.google.com.pk/
45http://vad1.com/continfo.html
45https://www.google.kz/
45http://www.vad1.com/lab/chizhov-2004/
44http://www.vad1.com/photo/stock/2008.html
43http://www.vad1.com/stats/vad1.com.html
43http://yandex.ru/yandsearch
42http://blog.laptop.org/2011/12/16/xo-juguete-qq/
42https://www.google.by/
42http://www.vad1.com/photo/stock/a84-30.html
42https://www.google.at/
41https://www.google.com.vn/
41http://www.vad1.com/photo/family-archive/vm-20081016-adresseavisen-1.html
41https://www.google.co.nz/
40http://www.vad1.com/photo/stock/n65-35flare.html
40http://www.vad1.com/photo/stock/1997.html
40http://www.bing.com/images/search
39http://www.vad1.com/dvd-buying-experience.html
39https://www.google.co.za/
39http://forum.skyscraperpage.com/showthread.php
19  http://forum.skyscraperpage.com/showthread.php?t=163493
17  http://forum.skyscraperpage.com/showthread.php?t=177349&page=4
36android-app://com.google.android.googlequicksearchbox
36https://www.google.co.ve/
35http://vad1.com/bio.html
35http://www.vad1.com/photo/stock/a66-30comp.html
34http://www.vad1.com/lab/publications/Bugge-Master-thesis-20120126.pdf
33http://notorioustax.tumblr.com/post/132886967143/wavestar-tektronix-crack
33http://www.vad1.com/photo/stock/a212-34.html
33http://www.vad1.com/photo/dirty-scanner/minolta-dscd2-hotpixel.html
33https://krasnodar-avtolombard.ru/
33http://vad1.com/robots.txt
33http://www.google.com/search
32http://metallo-konstruktsii.ru/
32http://www.rbkweb.no/forum/viewtopic.php
12  http://www.rbkweb.no/forum/viewtopic.php?t=551&postdays=0&postorder=asc&start=25
32http://www.vad1.com/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-10.html
30https://www.google.bg/
30http://www.idrawstuff.com/BraaTrondheim/
30http://www.vad1.com/photo/stock/a213-10.html
29http://www.vad1.com/photo/stock/a213-32.html
29https://www.google.cl/
29http://cn.bing.com/images/search
29http://www.vad1.com/adhoc/20180411vgjgnjbhjk/
29https://www.google.ae/
29https://www.google.lv/
29http://www.vad1.com/photo/stock/2005.html
28http://www.vad1.com/photo/stock/a214-5.html
28https://ofermerah.com/
28https://images.search.yahoo.com/images/view
28http://domain.com/
27http://www.vad1.com/photo/stock/a213-29.html
27http://www.vad1.com/photo/stock/20090705-eavesdropping-experiment-on-nus-campus-map.html
27http://www.vad1.com/photo/stock/a213-15.html
27http://www.vad1.com/photo/stock/a213-34.html
27http://m.facebook.com/
27https://www.google.sk/
27https://www.google.com.sa/
27http://www.vad1.com/photo/stock/a214-26.html
27http://www.vad1.com/photo/dirty-scanner/ls4000-ghosts.html
27https://www.google.ie/
26http://www.vad1.com/photo/stock/a215-6.html
26http://www.vad1.com/photo/stock/a215-3.html
26http://www.vad1.com/photo/stock/a215-19.html
26http://orthodoxy-rainbow.blogspot.com/search/label/%CE%9D%CE%BF%CF%81%CE%B2%CE%B7%CE%B3%CE%AF%CE%B1
26  http://orthodoxy-rainbow.blogspot.com/search/label/%CE%9D%CE%BF%CF%81%CE%B2%CE%B7%CE%B3%CE%AF%CE%B1?m=0
25http://www.vad1.com/photo/stock/n11-15-4.jpg
25https://www.google.rs/
25http://www.vad1.com/cv-vadim-makarov.pdf
25https://slomm.ru/
25http://www.vad1.com/photo/stock/a212-28.html
25http://www.vad1.com/lab/kirill/
24http://www.skyscrapercity.com/
24http://www.vad1.com/photo/stock/a210-34.html
24http://www.vad1.com/lab/alexey/
24https://www.ecosia.org/
24http://www.vad1.com/photo/foundview/
24https://officedocuments.net/
24http://www.skyscrapercity.com/forumdisplay.php
11  http://www.skyscrapercity.com/forumdisplay.php?f=75
24http://www.vad1.com/photo/stock/a215-12.html
24http://www.vad1.com/photo/stock/a48-13.html
24http://7ooo.ru/siters/private/
24http://www.vad1.com/photo/stock/20090226-bob-control-experiment-whole-setup.html
24http://www.vad1.com/lab/hacking-commercial-quantum-cryptography-2010
24http://www.vad1.com/photo/stock/2012.html
23http://www.vad1.com/photo/stock/a212-20.html
23https://online-intim.com/
23http://www.helmut-stoepfgeshoff.de/wartung.html
23https://www.google.lt/
23http://www.vad1.com/photo/stock/a215-4.html
22http://www.vad1.com/adhoc/20180417hdfgfghilc/
22https://www.qwant.com/
22http://www.vad1.com/publications/huang2016.IEEEJQuantumElectron-52-8000211.pdf
22http://www.vad1.com/robots.txt
22http://www.vad1.com/photo/stock/a211-4.html
22http://lostfilmhd1080.ru/
21http://youtotobe.com/
21http://www.vad1.com/photo/stock/201203-Anisimova-Makarov.html
21https://www.google.hr/
21https://en.wikipedia.org/
21http://xn----7sbabn5abjehfwi8bj.xn--p1ai/
21https://univerfiles.com/
21http://www.vad1.com/photo/stock/a212-23.html
20http://www.vad1.com/photo/stock/a8-31.html
20http://make-money-online.ru/
20http://www.vad1.com/publications/huang2016.QCrypt2016-subm69.pdf
20http://www.vad1.com/photo/stock/a210-12.html
20http://www.vad1.com/publications/sultana2017.QCrypt2017-subm152.pdf
20http://www.vad1.com/favicon.ico
20http://www.vad1.com/photo/stock/a210-25.html
20http://www.vad1.com/publications//jain2015.IEEEJSelTopQuantumElectron-21-6600710.pdf
7619[not listed: 2,912 URLs]

Search Query Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists which queries people used in search engines to find the site.

Listing queries, sorted by the number of requests.

reqssearch term
18nikon coolscan 5000 ed slide & film scanner
3hacker lab pics
2a layout of physics laboratory
2ко%80ей%81кие %81лова %81 пе%80еводом на %80%83%81%81кий
1table distance projection
1derti l9albi scaner
1the components of computer and their functions
1ко%80ей%81кие %81лова
1all the components of computer and their functions
1%87%82о пи%88%83%82 ко%80ей%86%8b в ин%82е%80не%82е л %80%83%81%81ки%85
1ilja gerhardt
1brandenburg gate quadriga
1framing photographs
1http://www.vad1.com/photo/dirty scanner/nikon ls 2000 lubrication guide.pdf
1hacking lab
1silja serenade
1http://www.vad1.com/photo/dirty scanner/ls2000 cleaning/
1how to trouble shoot a nikon coolscan 5000
1ftp protocol maximum speed
1на ко%80ей%81ком мил%8bе %81лова
1как напи%81а%82%8c им%8f на ко%80ей%81ком
1speckle
1по%87ем%83 ко%80ей%86%8b %81п%8f%82 в одежде
1circuit diagram avalanche photodiode
1декла%80а%86и%8f мака%80ов вадим

Search Word Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists which words people used in search engines to find the site.

Listing the top 30 query words by the number of requests, sorted by the number of requests.

reqssearch term
19coolscan
19nikon
195000
18slide
18&
18scanner
18film
18ed
4%81лова
4на
4of
4lab
3pics
3ко%80ей%81кие
3a
3hacker
2http://www.vad1.com/photo/dirty
2functions
2в
2%81
2%80%83%81%81кий
2пе%80еводом
2layout
2computer
2their
2ко%80ей%81ком
2the
2components
2physics
2ко%80ей%86%8b
56[not listed: 54 search terms]

Browser Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the vendors of visitors' browsers.

Listing the top 20 browsers by the number of requests for pages, sorted by the number of requests for pages.

no.reqspagesbrowser
1392171301828Netscape (compatible)
27184919791Chrome
 53294462  Chrome/41
 30571943  Chrome/63
 165371843  Chrome/65
 194751792  Chrome/66
 13351007  Chrome/43
 1035992  Chrome/30
 978978  Chrome/1
 1171730  Chrome/62
 1040714  Chrome/50
 6684559  Chrome/67
31488914253MauiBot (crawler.feedback+wc@gmail.com)
43375210656Firefox
 32443239  Firefox/40
 17331668  Firefox/45
 901838  Firefox/3
 4222832  Firefox/52
 1308798  Firefox/57
 10319726  Firefox/59
 6792599  Firefox/60
 518233  Firefox/43
 376169  Firefox/58
 136111  Firefox/24
5104539989The Knowledge AI
671465631MSIE
 15631335  MSIE/9
 13381298  MSIE/6
 1193280  MSIE/8
 293174  MSIE/7
 362167  MSIE/10
 8379  MSIE/5
 2913  MSIE/11
 1111  MSIE/2
 77  MSIE/3
 11  MSIE/4
7197135024Safari
 18981896  Safari/535
 3583963  Safari/9537
 6044840  Safari/604
 1278411  Safari/600
 3713344  Safari/605
 525149  Safari/603
 985105  Safari/602
 32286  Safari/537
 17471  Safari/533
 65070  Safari/601
839913835BUbiNG (+http:
 39913835  BUbiNG (+http://law
911781151MauiBot (crawler.feedback+dc@gmail.com)
10135331126Mozilla
 1817  Mozilla/1
 21  Mozilla/0
 2021  Mozilla/2
1124271009Baiduspider
 18811009  Baiduspider/2
12875834ZoominfoBot (zoominfobot at zoominfo dot com)
13720719Netscape
 650650  Netscape/6
 1918  Netscape/4
 1414  Netscape/3
 1111  Netscape/0
 11  Netscape/9
14675669DomainCrawler
 675669  DomainCrawler/3
15661638crawler (crawler.feedback@gmail.com)
161497477Opera
 179179  Opera/8
 1189170  Opera/9
 100100  Opera/7
 2727  Opera/6
 21  Opera/12
17472463Apache-HttpClient
 472463  Apache-HttpClient/4
18496439netEstate NE Crawler (+http:
 496439  netEstate NE Crawler (+http://www
19587435Toshiba Digital Solution TDSL
 587435  Toshiba Digital Solution TDSL/Nutch-1
20622425TurnitinBot (https:
 622425  TurnitinBot (https://turnitin
 111062863[not listed: 167 browsers]

Operating System Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the operating systems used by visitors.

Listing operating systems, sorted by the number of requests for pages.

no.reqspagesOS
1268474257331Known robots
217497582534OS unknown
38810225242Windows
 3221411295  Windows 7
 347956386  Windows NT
 135253267  Unknown Windows
 54863028  Windows XP
 869655  Windows Vista
 268197  Windows Server 2003
 312166  Windows 2000
 527147  Windows 8
 4847  Windows 95
 3232  Windows ME
 1612  Windows 98
 77  Windows CE
 33  Windows 3.1
42673811440Unix
 2638811387  Linux
 34752  Other Unix
 31  OpenBSD
5305195707Macintosh
631OS/2
720Symbian OS

Status Code Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the HTTP status codes of all requests.

Listing status codes, sorted numerically.

reqsstatus code
566861200 OK
13759206 Partial content
25462301 Document moved permanently
110302 Document found elsewhere
11871304 Not modified since last retrieval
486400 Bad request
8760404 Document not found
49405 Method not allowed
12408 Request timeout

File Size Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the sizes of files.

sizereqs%bytes
0106 
1B- 10B0 
11B- 100B0 
101B- 1kB42011 0.02%
1kB- 10kB62387 0.23%
10kB-100kB44877225.62%
100kB- 1MB27813 9.85%
1MB- 10MB987932.98%
10MB-100MB148824.33%
100MB- 1GB35 6.99%

File Type Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the extensions of files.

Listing extensions with at least 0.1% of the traffic, sorted by the amount of traffic.

reqs%bytesextension
14871728.28%.jpg [JPEG graphics]
2003626.95%.pdf [Adobe Portable Document Format]
178515.13%.pptx
191780 9.61%[directories]
191806 9.41%.html [Hypertext Markup Language]
529 3.98%.ppt
41 3.11%.m4v
637 2.29%.doc [Microsoft Word document]
115 0.54%.zip [Zip archives]
14716 0.40%.gif [GIF graphics]
22329 0.29%[not listed: 12 extensions]

Directory Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the directories from which files were requested. (The figures for each directory include all of its subdirectories.)

Listing directories with at least 0.01% of the traffic, sorted by the amount of traffic.

reqs%bytesdirectory
38797071.38%/lab/
11822716.76%/photo/
7419 8.67%/publications/
64406 1.33%[root directory]
7292 1.05%/adhoc/
502 0.44%/manuals/
2481 0.16%/korean-blog/
861 0.14%/stats/
1657 0.03%/listfirm/
34 0.03%/misc/
1642 0.01%[not listed: 5 directories]

Failure Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the files that caused failures, for example files not found.

Listing the top 30 files by the number of failed requests, sorted by the number of failed requests.

reqsfile
3216/wp-login.php
374/apple-touch-icon.png
337/files/mail.js
300/apple-touch-icon-precomposed.png
204/ads.txt
183/
120/plus/mytag_js.php
15  /plus/mytag_js.php?aid=511348
15  /plus/mytag_js.php?aid=8080
15  /plus/mytag_js.php?aid=9090
15  /plus/mytag_js.php?aid=6022
15  /plus/mytag_js.php?aid=9191
15  /plus/mytag_js.php?aid=9999
12  /plus/mytag_js.php?aid=9527
77/xmlrpc.php
46  /xmlrpc.php?rsd
67/index.php
19  /index.php?lang=Cn&index=0000
15  /index.php?m=member&c=index&a=register&siteid=1
65/style.css
54/sp...html
50/blog/
41/publications/physrevlett-107-170404.pdf
41/publications/physrevlett-107-110501.pdf
40/apple-touch-icon-120x120.png
39/lab/presentations/makarov-20170902-science-cafe-turku.pdf
39/publications/jain2013.qcrypt2013-poster.pdf
39/publications/liu2014.revsciinstrum-85-013108.pdf
38/publications/sajeed2017.scirep-7-8403.pdf
38/photo/family-archive/20121212-makarov.html
37/publications/jain2014.newjphys-16-123030.pdf
37/lab/publications/bugge-master-thesis-20120126.pdf
37/blog/robots.txt
36/publications/pugh2017.proccleo2017-atu4b.5.pdf
36/publications/iiumengj-12-no5-97.pdf
35/publications/huang2016.ieeejquantumelectron-52-8000211.pdf
34/lab/presentations/makarov-20160914-qcrypt-washingtondc-tutorial.pdf
32/publications/procoptsockoreaannualmeeting2008-417.pdf
31/publications/revsciinstrum-82-093110.pdf
31/apple-touch-icon-120x120-precomposed.png
3598[not listed: 1,170 files]

Request Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the files on the site.

Listing files with at least 20 requests, sorted by the number of requests.

reqs%byteslast timefile
36827 0.46%23/Jun/18 23:59/
72 23/Jun/18 02:29  /?author=5
67 23/Jun/18 02:30  /?author=1
67 23/Jun/18 02:30  /?author=4
61 23/Jun/18 02:30  /?s=vod-show-id-4-area-%E6%B3%B0%E5%9B%BD.html
60 23/Jun/18 02:29  /?s=vod-show-id-3-mcid-105.html
58 23/Jun/18 02:30  /?s=vod-show-id-35-mcid-14.html
57 23/Jun/18 02:30  /?s=vod-show-id-2-mcid-88.html
56 23/Jun/18 02:30  /?s=vod-show-id-1-mcid-30.html
56 23/Jun/18 02:31  /?x=() { :; }; echo Content-type:text/plain;echo;echo;echo M`expr 1330 7`H;/bin/uname -a;echo @ HTTP/1.0
52 23/Jun/18 02:49  /?author=2
51 23/Jun/18 02:31  /?s=vod-show-id-1-mcid-26.html
50 23/Jun/18 02:31  /?s=vod-show-id-1-mcid-37.html
50 23/Jun/18 02:31  /?T=reg
48 23/Jun/18 02:31  /?s=vod-show-id-1-mcid-33.html
47 23/Jun/18 02:31  /?s=vod-show-id-35-mcid-2.html
47 23/Jun/18 02:31  /?s=vod-show-id-1-mcid-11.html
47 23/Jun/18 02:31  /?s=vod-show-id-3-area-%E5%A4%A7%E9%99%86.html
46 23/Jun/18 02:32  /?s=vod-show-id-4-mcid-94.html
46 23/Jun/18 02:31  /?s=vod-show-id-3-area-%E9%A6%99%E6%B8%AF.html
46 23/Jun/18 02:32  /?s=vod-show-id-4-area-%E9%A6%99%E6%B8%AF.html
44 23/Jun/18 02:32  /?s=vod-show-id-2-mcid-80.html
44 23/Jun/18 02:32  /?author=0
43 23/Jun/18 02:32  /?s=Register
41 23/Jun/18 02:33  /?tag=%25E4%25B8%25AD%25E6%25B1%259F%25E5%258A%259F%2520/%2520%25E6%25B0%25B4%25E7%2594%25B0%25E6%2588%2590%25E8%258B%25B1%2520%2520/%2520%25E6%25A1%259C%25E5%25BA%25AD%25E4%25BF%25A1%25E4%25B8%2580
41 23/Jun/18 02:33  /?s=vod-show-id-3-mcid-116.html
40 23/Jun/18 02:53  /?page=login&cmd=register
40 23/Jun/18 02:33  /?s=vod-show-id35-mcid-6.html
40 23/Jun/18 02:33  /?sntpara=1000
39 23/Jun/18 02:33  /?s=vod-show-id-3-mcid-64.html
39 23/Jun/18 02:49  /?d96a349c52fc4f68eea46a47ccb3d360
39 23/Jun/18 02:34  /?s=vod-show-id-2-mcid-77.html
39 23/Jun/18 02:52  /?page=login&cmd=register
39 23/Jun/18 02:34  /?s=vod-show-id-2-mcid-112.html
39 23/Jun/18 02:34  /?s=vod-show-id-1-mcid-31.html
38 23/Jun/18 02:50  /?s5_responsive_switch_wwwmonwindows10com=0
38 23/Jun/18 02:35  /?gf_page=upload
38 23/Jun/18 02:34  /?s=vod-show-id-2-mcid-111.html
37 23/Jun/18 02:35  /?s=vod-show-id-2-mcid-73.html
37 23/Jun/18 02:35  /?s=vod-show-id-3-mcid-104.html
36 23/Jun/18 02:35  /?s=vod-show-id-1-mcid-9.html
35 23/Jun/18 02:53  /?author=3
34 23/Jun/18 02:51  /?s=vod-show-id-1-mcid-29.html
34 23/Jun/18 02:50  /?s=vod-show-id-1-mcid-42.html
34 23/Jun/18 02:50  /?s=vod-show-id-3-area-%E7%BE%8E%E5%9B%BD.html
33 23/Jun/18 02:51  /?s=vod-show-id-1-mcid-35.html
33 23/Jun/18 02:36  /?s=vod-show-id-1-mcid-41.html
33 23/Jun/18 02:52  /?s=vod-show-id-1-mcid-39.html
33 23/Jun/18 02:52  /?s=vod-show-id-1-mcid-36.html
33 23/Jun/18 02:50  /?s=vod-show-id-3-mcid-58.html
33 23/Jun/18 02:51  /?s=vod-show-id35-mcid-2.html
32 23/Jun/18 02:53  /?author=10
32 23/Jun/18 02:53  /?author=11
32 23/Jun/18 02:53  /?author=12
32 23/Jun/18 02:53  /?author=13
32 23/Jun/18 02:51  /?s=vod-show-id-4-area-%E7%BE%8E%E5%9B%BD.html
32 23/Jun/18 02:51  /?s=vod-show-id-4-area-%E6%97%A5%E6%9C%AC.html
32 23/Jun/18 02:53  /?author=6
32 23/Jun/18 02:54  /?author=7
32 23/Jun/18 02:54  /?author=8
32 23/Jun/18 02:54  /?author=9
31 23/Jun/18 02:50  /?s=vod-show-id-2-mcid-81.html
31 23/Jun/18 02:52  /?s=vod-show-id-2-mcid-110.html
31 23/Jun/18 02:50  /?s=vod-show-id-35-mcid-1.html
31 23/Jun/18 02:38  /?s=vod-show-id-1-mcid-43.html
31 23/Jun/18 02:51  /?s=vod-show-id-2-mcid-87.html
31 23/Jun/18 02:51  /?s=vod-show-id-3-mcid-106.html
30 23/Jun/18 02:52  /?s=vod-show-id-2-mcid-84.html
30 23/Jun/18 02:54  /?author=14
30 23/Jun/18 02:54  /?author=15
30 23/Jun/18 02:53  /?s=vod-show-id-2-mcid-83.html
30 23/Jun/18 02:51  /?tellafriend=send-mail
29 23/Jun/18 02:53  /?s=vod-show-id-2-mcid-85.html
28 23/Jun/18 02:51  /?s=vod-show-id-3-mcid-108.html
28 23/Jun/18 02:52  /?s=vod-show-id35-mcid-4.html
28 23/Jun/18 02:53  /?s=vod-show-id-35-mcid-6.html
28 23/Jun/18 02:53  /?s=vod-show-id-3-mcid-109.html
27 23/Jun/18 02:53  /?s=vod-show-id-2-mcid-74.html
20 23/Jun/18 02:55  /?x=() { : HTTP/1.1
17 23/Jun/18 02:55  /?x=() { : HTTP/1.1 HTTP/1.1
16 23/Jun/18 02:55  /?x=() { : HTTP/1.1 HTTP/1.1 HTTP/1.1
14 23/Jun/18 02:55  /?s=vod-show-id-1-mcid-10.html
13 23/Jun/18 02:55  /?s=vod-show-id-2-mcid-72.html
13 23/Jun/18 02:55  /?s=vod-show-id-2-mcid-113.html
13 23/Jun/18 02:55  /?s=vod-show-id-4-mcid-99.html
13 23/Jun/18 02:55  /?s=vod-show-id35-mcid-15.html
11540 0.01%23/Jun/18 23:58/robots.txt
7112 0.17%28/Apr/18 12:56/adhoc/20180417hdfgfghilc/paper-20180405-20180417-comments-by-VM.pdf
5100 23/Jun/18 23:43/favicon.ico
2761 0.06%23/Jun/18 22:11/lab/
46 23/Jun/18 02:56  /lab/?hootPostID=04a20cd17539990ada512e833c02d90f
41 23/Jun/18 02:28  /lab/?fb_locale=tr_TR
37 23/Jun/18 10:02  /lab/?d96a349c52fc4f68eea46a47ccb3d360
37 23/Jun/18 02:56  /lab/?hootPostID=099fada0d3af2f3086e722586fc5bb70
27 23/Jun/18 02:56  /lab/?lipi=urn:li:page:d_flagship3_feed%3BtwXpsEfFQRyCmom1aDeVsQ%3D%3D
2219 0.01%23/Jun/18 23:51/addcomment2.html
1689 0.65%23/Jun/18 20:30/photo/stock/a48-13-4.jpg
1573 0.02%23/Jun/18 17:19/tcp-throughput-limit.html
1484 23/Jun/18 22:11/lab/style.css
1373 1.45%22/Jun/18 14:58/publications/phd-thesis-makarov-200703-photos300dpi.pdf
1242 0.01%23/Jun/18 20:09/lab/jolly-phi-1ss.gif
1191 0.04%23/Jun/18 22:31/spam.html
1188 23/Jun/18 04:33/photo/foundview/finalfv/
48 23/Jun/18 02:56  /photo/foundview/finalfv/?C=N%2525252525252525253bO=D
45 23/Jun/18 02:57  /photo/foundview/finalfv/?C=D%25252525252525253bO=A
45 23/Jun/18 02:56  /photo/foundview/finalfv/?C=S;O=A
45 23/Jun/18 02:57  /photo/foundview/finalfv/?C=M%2525252525252525253bO=A
43 23/Jun/18 02:57  /photo/foundview/finalfv/?C=S%25253bO=D
41 23/Jun/18 02:57  /photo/foundview/finalfv/?C=S%25252525252525253bO=D
39 23/Jun/18 02:57  /photo/foundview/finalfv/?C=D%25252525252525253bO=D
39 23/Jun/18 02:57  /photo/foundview/finalfv/?C=N%25253bO=A
39 23/Jun/18 02:57  /photo/foundview/finalfv/?C=M%2525252525252525252525252525253bO=D
38 23/Jun/18 02:57  /photo/foundview/finalfv/?C=D%253bO=D
38 23/Jun/18 02:57  /photo/foundview/finalfv/?C=M%252525253bO=D
38 23/Jun/18 02:57  /photo/foundview/finalfv/?C=M%25252525252525253bO=D
38 23/Jun/18 02:57  /photo/foundview/finalfv/?C=S%25252525252525253bO=A
36 23/Jun/18 02:57  /photo/foundview/finalfv/?C=M%2525252525252525253bO=D
35 23/Jun/18 02:58  /photo/foundview/finalfv/?C=M;O=D
34 23/Jun/18 02:57  /photo/foundview/finalfv/?C=D;O=D
31 23/Jun/18 04:33  /photo/foundview/finalfv/?C=D%252525253bO=D
31 23/Jun/18 02:57  /photo/foundview/finalfv/?C=S;O=D
30 23/Jun/18 02:57  /photo/foundview/finalfv/?C=D%2525253bO=D
30 23/Jun/18 02:58  /photo/foundview/finalfv/?C=N;O=D
29 23/Jun/18 02:58  /photo/foundview/finalfv/?C=M%2525252525252525252525253bO=D
29 23/Jun/18 02:58  /photo/foundview/finalfv/?C=D;O=A
29 23/Jun/18 02:58  /photo/foundview/finalfv/?C=M;O=A
29 23/Jun/18 02:58  /photo/foundview/finalfv/?C=N;O=A
29 23/Jun/18 04:33  /photo/foundview/finalfv/?C=N%252525252525252525253bO=A
28 23/Jun/18 04:33  /photo/foundview/finalfv/?C=M%252525252525252525252525252525253bO=D
28 23/Jun/18 04:33  /photo/foundview/finalfv/?C=N%25252525252525253bO=D
28 23/Jun/18 04:32  /photo/foundview/finalfv/?C=S%25252525253bO=A
14 23/Jun/18 04:33  /photo/foundview/finalfv/?C=S%2525253bO=D
1185 23/Jun/18 17:37/addcomment.html
1185 23/Jun/18 22:11/lab/transparent.gif
1167 0.12%23/Jun/18 21:00/lab/pictures/20151112-Huang-testing-Clavis2-2l.jpg
1120 0.40%23/Jun/18 20:14/photo/dirty-scanner/nikon-ls-2000-lubrication-guide.pdf
1099 0.03%23/Jun/18 23:43/photo/family-archive/vm-20081016-adresseavisen-1-1.jpg
1099 0.02%23/Jun/18 23:10/photo/dirty-scanner/
1095 0.02%23/Jun/18 20:09/lab/eve1-1.gif
1035 0.13%23/Jun/18 20:09/lab/pictures/20130521-whiteboard-cat-3.jpg
1023 0.03%23/Jun/18 23:43/photo/family-archive/20110902-Vadim-Makarov-and-bagpiper-ape-at-Heriot-Watt-University-Edinburgh-1.jpg
1003 0.08%23/Jun/18 22:11/lab/pictures/20170930-St-Petersburg-mushroom-picking-2l.jpg
1003 0.02%23/Jun/18 23:43/photo/family-archive/20121212-Makarov-1scr2.jpg
998 0.05%23/Jun/18 23:43/photo/family-archive/20090815-HAR-quantum-eavesdropper-demo-1.jpg
991 0.02%23/Jun/18 23:43/photo/stock/a9-19-1.jpg
990 23/Jun/18 20:09/lab/favicon.ico
983 0.07%23/Jun/18 20:09/lab/pictures/20120929-QNC-open-house-img5050-3s.jpg
983 0.08%23/Jun/18 20:09/lab/pictures/20171004-St-Petersburg-ITMO-2l.jpg
970 0.03%23/Jun/18 23:43/photo/family-archive/vm-20080322-kwanghanru-cr1s.jpg
969 0.07%23/Jun/18 20:09/lab/pictures/20141125-Wei-Xu-Sajeed-in-quantum-hacking-lab-2l.jpg
968 23/Jun/18 23:43/graphics/eve-colorbg-1.gif
964 0.07%23/Jun/18 20:09/lab/pictures/20160812-Lim-shows-APD-testing-setup-labQNC3301-2-2l.jpg
963 0.08%23/Jun/18 20:09/lab/pictures/20170315-quantum-hacking-lab-group-picture-2l.jpg
961 0.04%23/Jun/18 20:09/lab/pictures/20160805-Curty-in-labQNC3303-2l.jpg
947 0.05%23/Jun/18 20:09/lab/pictures/20141126-Lim-in-quantum-hacking-lab-2l.jpg
931 0.06%23/Jun/18 20:09/lab/pictures/20141031-pumpkin-with-Anqi-Huang-2l.jpg
903 0.06%23/Jun/18 22:11/lab/pictures.html
47 23/Jun/18 02:28  /lab/pictures.html?fb_locale=zh_CN
37 23/Jun/18 04:34  /lab/pictures.html?fb_locale=es_LA
37 23/Jun/18 04:34  /lab/pictures.html?fb_locale=it_IT
37 23/Jun/18 04:34  /lab/pictures.html?fb_locale=de_DE
35 23/Jun/18 04:35  /lab/pictures.html?fb_locale=ja_JP
35 23/Jun/18 04:34  /lab/pictures.html?fb_locale=fr_FR
34 23/Jun/18 04:35  /lab/pictures.html?fb_locale=en_GB
33 23/Jun/18 04:34  /lab/pictures.html?fb_locale=th_TH
26 23/Jun/18 04:35  /lab/pictures.html?fb_locale=ko_KR
25 23/Jun/18 04:35  /lab/pictures.html?fb_locale=ru_RU
902 0.01%23/Jun/18 17:34/lab/people.html
66 23/Jun/18 04:33  /lab/people.html?sa=X&ved=0CCQQ9QEwCGoVChMI8qyV39T2xgIVypIeCh2xPQ72
63 23/Jun/18 04:34  /lab/people.html?sa=X&ved=0CCQQ9QEwCGoVChMI8qyV39T2xgIVypIeCh2xPQ72
57 23/Jun/18 15:54  /lab/people.html?sa=X&ved=0CCQQ9QEwCGoVChMI
52 23/Jun/18 11:28  /lab/people.html?sa=X&ved=0CCQQ9QEwCGoVChMI8qyV39T2xgIVypIeCh2xPQ72
48 23/Jun/18 04:34  /lab/people.html?sa=X&ved=0CCQQ9QEwCGoVChMI8qyV39T2xgIVypIeCh2xPQ72
34 23/Jun/18 04:34  /lab/people.html?sa=X&ved=0CCQQ9QEwCGoVChMI8qyV39T2xgIVypIeCh2xPQ72
862 0.02%23/Jun/18 21:26/lab/hacking-commercial-quantum-cryptography-2010/
59 23/Jun/18 04:35  /lab/hacking-commercial-quantum-cryptography-2010/?sa=X&ved=0CC8Q9QEoADASahUKEwiKs9D02vfGAhWOLYgKHXyyBGo
55 23/Jun/18 04:35  /lab/hacking-commercial-quantum-cryptography-2010/?sa=X&ved=0CBsQ9QEoADAIahUKEwivgq2JlPrGAhWD6xQKHVs9DMw
38 23/Jun/18 04:35  /lab/hacking-commercial-quantum-cryptography-2010/?sa=X&ved=0CC8Q9QEoADASahUKEwiKs9D02v
36 23/Jun/18 04:36  /lab/hacking-commercial-quantum-cryptography-2010/?sa=X&ved=0CC8Q9QEoADASahUKEwiKs9D02vfG
816 0.03%23/Jun/18 19:56/lab/pictures/
88 23/Jun/18 19:56  /lab/pictures/?C=S;O=D
76 23/Jun/18 19:27  /lab/pictures/?C=N;O=D
75 23/Jun/18 04:38  /lab/pictures/?C=D;O=D
70 23/Jun/18 05:58  /lab/pictures/?C=M;O=D
66 23/Jun/18 10:01  /lab/pictures/?C=M;O=A
62 23/Jun/18 04:38  /lab/pictures/?C=N;O=A
61 23/Jun/18 19:56  /lab/pictures/?C=D;O=A
60 23/Jun/18 06:45  /lab/pictures/?C=S;O=A
56 23/Jun/18 04:38  /lab/pictures/?C=D
54 23/Jun/18 04:38  /lab/pictures/?C=S
49 23/Jun/18 04:38  /lab/pictures/?C=N
35 23/Jun/18 04:38  /lab/pictures/?C=M
808 0.08%23/Jun/18 23:20/korean-blog/dentists-concise-dictionary-20071114.gif
801 0.08%23/Jun/18 22:16/photo/stock/n20-1-3.jpg
757 1.47%23/Jun/18 19:55/lab/pictures/20151112-Huang-testing-Clavis2.jpg
752 0.03%23/Jun/18 19:33/korean-blog/index-ru.html
712 23/Jun/18 23:29/photo/
691 0.02%23/Jun/18 22:57/photo/x-ray-exper.html
666 0.03%23/Jun/18 20:09/lab/logo-RQC.png
656 0.02%23/Jun/18 20:09/lab/logo-MISIS.png
620 23/Jun/18 17:31/photo/lights-trondheim/
42 23/Jun/18 04:38  /photo/lights-trondheim/?mqq_source=iphoneqq
611 23/Jun/18 21:52/photo/dirty-scanner/ls2000-cleaning/
604 0.03%23/Jun/18 22:42/hosting.html
601 0.02%23/Jun/18 19:04/lab/publications.html
595 0.03%23/Jun/18 17:40/publications/
592 0.14%22/Jun/18 11:29/photo/stock/a9-19-4.jpg
560 0.81%23/Jun/18 16:53/photo/stock/20090226-bob-control-experiment-whole-setup-5.jpg
554 23/Jun/18 22:13/photo/framing.html
550 21/May/18 16:06/lab/logo-uWaterloo.gif
527 1.19%23/Jun/18 17:51/photo/stock/a9-19-5.jpg
526 0.13%23/Jun/18 01:24/photo/stock/a89-7-4.jpg
518 23/Jun/18 17:19/stats/
511 1.25%23/Jun/18 03:58/lab/kirill/diploma.pdf
506 23/Jun/18 19:04/lab/starlet.gif
477 23/Jun/18 17:26/photo/stock/
465 23/Jun/18 17:28/bio.html
464 0.17%23/Jun/18 16:28/photo/stock/n11-15-4.jpg
462 23/Jun/18 23:44/continfo.html
459 0.03%23/Jun/18 20:16/photo/stock/n65-35flare-2.jpg
449 0.03%23/Jun/18 08:01/little-prince-spam.gif
448 0.01%23/Jun/18 20:45/photo/stock/n10-8-1s.jpg
448 0.03%23/Jun/18 20:16/photo/stock/n65-35-2.jpg
448 0.01%23/Jun/18 17:21/lab/full-eavesdropping-2011/
447 0.01%23/Jun/18 20:16/photo/stock/n61-26-1.jpg
447 0.01%23/Jun/18 20:16/photo/stock/n8-23-1.jpg
446 0.01%23/Jun/18 20:16/photo/stock/n87-15-1.jpg
444 0.01%23/Jun/18 20:16/photo/dirty-scanner/pcd-ccd-leakage-1.jpg
444 0.88%23/Jun/18 10:49/photo/stock/n40-17-5.jpg
443 0.01%23/Jun/18 20:16/photo/dirty-scanner/minolta-dscd2-hotpixel-1.jpg
439 0.01%23/Jun/18 20:16/photo/dirty-scanner/n61-26-flare-1fr.jpg
439 0.01%23/Jun/18 20:45/photo/stock/n20-13-1s.jpg
433 0.01%23/Jun/18 20:16/photo/dirty-scanner/neg-flare-1.jpg
433 0.09%23/Jun/18 17:34/cv-vadim-makarov.pdf
427 0.01%23/Jun/18 17:07/listfirm/optcomp.html
426 3.37%21/Jun/18 17:21/lab/publications/anisimova2018.thesis-PhD.pdf
424 23/Jun/18 17:25/photo/family-archive/vm-20081016-adresseavisen-1.html
422 23/Jun/18 20:16/photo/dirty-scanner/halo-sample1-1s.jpg
420 23/Jun/18 19:04/lab/other.html
420 23/Jun/18 20:16/photo/dirty-scanner/halo-sample2-1.jpg
415 23/Jun/18 17:41/listfirm/
406 0.14%23/Jun/18 17:53/photo/stock/a103-18-4.jpg
402 0.01%23/Jun/18 17:36/photo/autodof.html
27 23/Jun/18 04:38  /photo/autodof.html?pagewanted=all
388 0.22%22/Jun/18 02:53/photo/stock/a84-30-4.jpg
376 23/Jun/18 21:20/photo/perfect-slide-exp.html
375 0.02%23/Jun/18 16:54/lab/hacking-commercial-quantum-cryptography-2010/20081211-id3110-detector-board-front-components_identified_blurred-2.jpg
372 23/Jun/18 19:09/photo/spotmeter.html
370 2.32%23/Jun/18 01:39/lab/presentations/Makarov-20140801-IQC-short-course.pptx
361 0.03%23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/ls2000_02.jpg
356 0.01%23/Jun/18 17:40/lab/press/
356 0.11%23/Jun/18 12:21/photo/stock/n29-5-4.jpg
355 23/Jun/18 04:39/photo/foundview/art/
47 23/Jun/18 04:38  /photo/foundview/art/?C=S;O=A
45 23/Jun/18 04:38  /photo/foundview/art/?C=N;O=A
38 23/Jun/18 04:38  /photo/foundview/art/?C=S;O=D
37 23/Jun/18 04:39  /photo/foundview/art/?C=M;O=D
33 23/Jun/18 04:39  /photo/foundview/art/?C=M;O=A
33 23/Jun/18 04:39  /photo/foundview/art/?C=D;O=D
32 23/Jun/18 04:39  /photo/foundview/art/?C=N;O=D
30 23/Jun/18 04:39  /photo/foundview/art/?C=D;O=A
355 23/Jun/18 20:47/photo/family-archive/
352 0.01%23/Jun/18 06:41/photo/stock/a56-2-1.jpg
346 23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/ls2000.gif
344 0.01%23/Jun/18 17:30/dvd-buying-experience.html
340 0.01%23/Jun/18 06:41/photo/stock/a27-36-1.jpg
339 23/Jun/18 17:33/manuals/
337 22/Jun/18 19:13/spam/spam-20061123-constrai85.gif
334 23/Jun/18 17:39/photo/stock/a9-19.html
331 0.01%23/Jun/18 16:22/photo/stock/a215-19-1s.jpg
331 0.03%23/Jun/18 21:54/photo/dirty-scanner/ls2000-cleaning/ls2000_10.jpg
330 0.02%23/Jun/18 21:54/photo/dirty-scanner/ls2000-cleaning/ls2000_11.jpg
329 22/Jun/18 07:06/photo/ultimate-photo-shoot/
329 23/Jun/18 17:33/photo/family-archive/20121212-Makarov.html
327 0.02%23/Jun/18 22:11/lab/pictures/20160518-Garcia-Escartin-in-labQNC3303-2l.jpg
325 0.01%22/Jun/18 19:13/photo/stock/a50-32-1.jpg
322 23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/logo2.gif
320 0.02%23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/ls2000_06.jpg
318 0.02%23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/ls2000_01.jpg
318 0.03%23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/ls2000_05.jpg
316 0.02%23/Jun/18 21:54/photo/dirty-scanner/ls2000-cleaning/ls2000_07.jpg
316 0.03%23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/ls2000_04.jpg
315 0.03%23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/ls2000_03.jpg
314 0.03%23/Jun/18 21:54/photo/dirty-scanner/ls2000-cleaning/ls2000_09.jpg
314 0.02%23/Jun/18 21:54/photo/dirty-scanner/ls2000-cleaning/ls2000_08.jpg
312 23/Jun/18 22:20/lab/torbjoern/apd-geiger-mode-2.gif
310 23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/rotatebeacon.gif
310 23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/logo1.gif
305 0.01%23/Jun/18 17:35/lab/presentations/
304 23/Jun/18 21:53/photo/dirty-scanner/ls2000-cleaning/beacon2.gif
303 23/Jun/18 04:43/photo/stock/a25-8.html
40 23/Jun/18 04:39  /photo/stock/a25-8.html?module=legislation&country=Netherlands
39 23/Jun/18 04:39  /photo/stock/a25-8.html?module=legislation&country=Bulgaria
29 23/Jun/18 04:39  /photo/stock/a25-8.html?module=legislation&country=Croatia
28 23/Jun/18 04:39  /photo/stock/a25-8.html?module=legislation&country=Switzerland
28 23/Jun/18 04:39  /photo/stock/a25-8.html?module=legislation&country=Austria
28 23/Jun/18 04:43  /photo/stock/a25-8.html?module=legislation&country=Latvia
28 23/Jun/18 04:43  /photo/stock/a25-8.html?module=legislation&country=Denmark
299 0.02%23/Jun/18 17:48/photo/family-archive/vm-20081016-adresseavisen-1-3.jpg
299 0.06%23/Jun/18 10:40/photo/stock/a82-8-4.jpg
297 23/Jun/18 17:30/links.html
296 23/Jun/18 01:18/lab/torbjoern/
295 23/Jun/18 17:21/photo/moncal.html
286 1.15%22/Jun/18 12:30/publications/phd-thesis-makarov-200703.pdf
284 0.01%23/Jun/18 17:27/lab/conferences.html
279 23/Jun/18 18:06/listfirm/elcomp.html
276 23/Jun/18 17:42/photo/folldal/
275 0.01%23/Jun/18 03:39/lab/news-archive.html
269 0.07%23/Jun/18 01:17/lab/pictures/lab3301-layout-plan-20120307-4.jpg
267 23/Jun/18 13:25/photo/stock/n20-34.html
261 0.47%23/Jun/18 19:25/photo/stock/a84-30-5.jpg
257 0.01%23/Jun/18 22:13/photo/matt1.gif
256 0.01%23/Jun/18 22:11/photo/stock/a5-17-1.jpg
250 0.01%23/Jun/18 01:56/lab/pictures/Anqi-Huang-2scr.jpg
250 0.01%23/Jun/18 17:50/photo/family-archive/20121212-Makarov-2scr.jpg
245 0.06%23/Jun/18 19:16/photo/stock/n20-1-4.jpg
242 23/Jun/18 18:25/photo/stock/n89-36.html
241 23/Jun/18 01:56/lab/pictures/Poompong-Chaiwongkhot-1s.jpg
237 0.01%23/Jun/18 22:11/photo/stock/a297-31-1.jpg
236 0.04%23/Jun/18 12:06/photo/ultimate-photo-shoot/50th-2.gif
234 0.01%23/Jun/18 22:11/photo/stock/20090226-bob-control-experiment-eve-faked-state-generator-1.jpg
234 23/Jun/18 22:57/photo/stock/a18-33-1.jpg
230 23/Jun/18 22:28/oacs-20021112-crash-netscape-4_7.gif
230 0.01%23/Jun/18 22:11/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-P400-1.jpg
229 23/Jun/18 17:28/photo/sky/
229 0.65%22/Jun/18 13:12/lab/publications/sajeed2017.thesis-PhD.pdf
229 23/Jun/18 00:09/photo/moncal.gif
225 23/Jun/18 17:34/photo/lights-trondheim/pg3.html
224 23/Jun/18 17:41/photo/scanning.html
224 23/Jun/18 22:13/photo/fingerprint.gif
223 0.01%23/Jun/18 22:11/photo/stock/201203-Makarov-1-1.jpg
222 23/Jun/18 17:21/addlink.html
221 23/Jun/18 20:01/photo/stock/a48-13.html
216 0.41%22/Jun/18 07:08/lab/publications/Bugge-student-project-report-20110614.pdf
215 23/Jun/18 18:34/photo/services-exper.html
214 23/Jun/18 22:57/photo/stock/a17-8-1.jpg
214 0.01%23/Jun/18 22:11/photo/stock/201203-Makarov-2-1.jpg
214 0.36%23/Jun/18 17:27/lab/pictures/20171004-St-Petersburg-ITMO.jpg
212 0.03%22/Jun/18 17:27/photo/stock/n89-36-4.jpg
211 23/Jun/18 08:22/photo/stock/hi-res.html
42 23/Jun/18 04:43  /photo/stock/hi-res.html?vm=r
210 0.01%23/Jun/18 22:11/photo/stock/a141-7-1.jpg
210 23/Jun/18 22:11/photo/stock/a140-33-1.jpg
209 0.01%23/Jun/18 22:11/photo/stock/201203-Anisimova-Makarov-1.jpg
209 0.01%23/Jun/18 05:12/photo/stock/a50-32-3.jpg
208 23/Jun/18 22:11/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-variable-attenuator-1.jpg
204 0.14%23/Jun/18 19:49/photo/family-archive/20090815-HAR-quantum-eavesdropper-demo-4.jpg
201 23/Jun/18 17:41/photo/esn/
200 0.01%23/Jun/18 22:11/photo/stock/a60-7-1.jpg
195 0.77%22/Jun/18 16:21/lab/publications/Lydersen-PhD-thesis-20110919.pdf
193 0.06%23/Jun/18 17:04/photo/stock/a8-31-4.jpg
192 0.05%23/Jun/18 17:24/photo/stock/n12-29-4.jpg
192 23/Jun/18 19:05/photo/stock/n20-1.html
192 0.65%23/Jun/18 19:44/lab/publications/Bugge-Master-thesis-20120126.pdf
191 23/Jun/18 22:11/photo/stock/a66-30comp-1.jpg
187 23/Jun/18 17:41/photo/foundview/
186 22/Jun/18 21:19/photo/stock/a103-18.html
186 0.05%23/Jun/18 22:36/photo/stock/n8-6-4.jpg
186 1.76%23/Jun/18 01:40/lab/presentations/Makarov-20140702-school-Bucharest.pptx
185 0.01%23/Jun/18 22:11/lab/pictures/20141126-Wei-Xu-in-quantum-hacking-lab-2l.jpg
185 0.01%23/Jun/18 07:00/photo/stock/n89-16-3.jpg
184 23/Jun/18 22:11/photo/stock/pm-open-54dpi.jpg
183 22/Jun/18 13:03/lab/paper-makarov-2004/
182 0.01%22/Jun/18 22:16/photo/family-archive/vm-20080322-kwanghanru-1.jpg
182 0.06%20/Jun/18 21:46/lab/artem/diploma.doc
181 23/Jun/18 01:55/photo/stock/a89-7.html
180 23/Jun/18 17:28/photo/folldal/index-ru.html
178 0.06%23/Jun/18 07:41/photo/stock/n38-3-4.jpg
178 0.05%23/Jun/18 18:23/photo/stock/a141-27-4.jpg
176 0.76%22/Jun/18 02:56/lab/publications/chaiwongkhot2015.thesis-MSc-20151230.pdf
175 23/Jun/18 01:42/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-05.html
175 23/Jun/18 02:23/photo/stock/n11-15.html
174 0.35%18/Jun/18 06:58/photo/stock/a230-16-5.jpg
172 23/Jun/18 11:18/photo/stock/a66-30comp.html
172 23/Jun/18 17:27/photo/equipment.html
172 0.01%23/Jun/18 22:11/lab/pictures/20141218-lab-QNC3301-construction-Pinheiro-cutting-2l.jpg
171 21/Jun/18 12:22/listfirm/t_and_m.html
171 23/Jun/18 20:05/photo/ultimate-photo-shoot/group.html
171 23/Jun/18 08:23/photo/copyright.html
170 0.01%22/Jun/18 07:38/photo/family-archive/vm-20071203-behind-qkd-setup-at-mimos-kuala-lumpur-1.jpg
167 0.01%23/Jun/18 00:36/photo/stock/a211-25-2.jpg
167 23/Jun/18 04:43/index_referring.html
167 23/Jun/18 08:24/spam-solution.html
167 0.01%23/Jun/18 22:11/lab/pictures/20141218-lab-QNC3301-construction-Makarov-testing-shelf-2l.jpg
166 1.55%23/Jun/18 01:36/lab/presentations/Makarov-20160120-IDQ-winter-school.pptx
166 0.14%23/Jun/18 17:29/stats/vad1.com.html
166 23/Jun/18 02:19/photo/stock/a84-30.html
165 23/Jun/18 12:28/photo/stock/20090226-bob-control-experiment-whole-setup.html
164 0.31%23/Jun/18 17:25/lab/pictures/20170930-St-Petersburg-mushroom-picking.jpg
164 23/Jun/18 04:43/photo/stock/n65-35flare.html
42 23/Jun/18 04:43  /photo/stock/n65-35flare.html?page=425&artistname=Ajay-De
162 23/Jun/18 17:38/photo/phd-defence-20070430/
161 0.01%23/Jun/18 22:11/lab/pictures/20160313-Daria-in-labQNC3303-2l.jpg
160 22/Jun/18 19:03/lab/paper-makarov-2005/
160 0.02%22/Jun/18 01:57/photo/stock/a48-13-3.jpg
159 0.03%23/Jun/18 01:05/photo/stock/n22-27-4.jpg
159 0.01%23/Jun/18 22:11/lab/pictures/20140613-radiation-testing-bench-2l.jpg
158 0.01%23/Jun/18 22:11/lab/pictures/20140611-Anisimova-Bourgoin-assembling-test-plate-2l.jpg
157 23/Jun/18 01:07/htaccess-hostname-forcing
157 1.52%23/Jun/18 01:39/lab/presentations/Makarov-20140930-UWaterloo-phys10-undergrad-seminar.pptx
157 0.01%23/Jun/18 22:11/lab/pictures/20160812-Lim-shows-APD-testing-setup-labQNC3301-1-2l.jpg
156 0.48%22/Jun/18 16:19/publications/jain2015.IEEEJSelTopQuantumElectron-21-6600710.pdf
156 23/Jun/18 19:13/photo/stock/n10-8.html
156 23/Jun/18 17:43/photo/lights-trondheim/pg2.html
155 0.01%23/Jun/18 22:11/lab/pictures/20140611-cyclotron-hall-2l.jpg
155 21/Jun/18 22:44/photo/stock/a285-23.html
155 23/Jun/18 11:23/photo/stock/1998.html
154 0.01%23/Jun/18 22:11/lab/pictures/20140606-3-pallets-to-ship-2l.jpg
154 0.01%23/Jun/18 22:11/lab/pictures/20140310-satellite-prototype-detector-board-persp-loose-black-2l.jpg
154 23/Jun/18 01:41/lab/alexey/
154 23/Jun/18 22:11/lab/pictures/20140612-Rados-RDS-30-dosimeter-2l.jpg
154 0.01%23/Jun/18 22:11/lab/pictures/20140612-Bourgoin-aligning-test-plate-on-irradiation-stand-2l.jpg
154 23/Jun/18 22:11/photo/stock/a60-19-1.jpg
152 0.01%23/Jun/18 22:11/lab/pictures/20150401-Darya-IDQ-little-helper-h-2l.jpg
152 0.01%23/Jun/18 22:11/lab/pictures/20140613-Makarov-coins-on-top-of-cyclotron-2l.jpg
152 23/Jun/18 02:28/photo/stock/a8-31.html
152 0.01%23/Jun/18 22:11/lab/pictures/20140503-radiation-testing-detector-group-front-2l.jpg
152 22/Jun/18 13:30/lab/paper-vakhitov-2001/
151 23/Jun/18 03:08/photo/stock/n23-17.html
151 0.01%23/Jun/18 22:11/lab/pictures/20140612-Higgins-starting-irradiation-test-2l.jpg
151 0.01%23/Jun/18 22:11/lab/pictures/20140612-radiation-warning-label-2l.jpg
151 0.01%23/Jun/18 22:11/lab/pictures/20140612-team-in-testing-room-2l.jpg
151 23/Jun/18 17:38/photo/coupons.html
150 0.01%23/Jun/18 22:11/lab/pictures/20140612-Piche-checking-residual-radiation-after-irradiation-test-2l.jpg
150 0.01%21/Jun/18 17:09/lab/pictures/lab3301-layout-plan-20120307-2cr.jpg
150 0.01%22/Jun/18 20:40/photo/stock/a275-4-1.jpg
149 0.01%23/Jun/18 22:11/lab/pictures/20140613-team-in-control-room-2l.jpg
149 22/Jun/18 17:41/photo/stock/n89-36-1.jpg
149 0.01%23/Jun/18 22:11/lab/pictures/20140612-Higgins-Bourgoin-discussing-post-irradiation-test-2l.jpg
149 0.01%23/Jun/18 22:11/lab/pictures/20140611-test-plate-front-2l.jpg
149 0.06%22/Jun/18 04:39/photo/stock/n100-30-4.jpg
149 0.01%23/Jun/18 22:11/lab/pictures/20140503-radiation-testing-detector-group-back-2l.jpg
148 0.01%23/Jun/18 18:47/photo/stock/minimum-disturbance-measurement-setup-20080418-3-2.jpg
148 0.01%23/Jun/18 22:11/lab/pictures/20140611-Anisimova-Bourgoin-assembling-test-plate-a-2l.jpg
148 22/Jun/18 23:26/photo/stock/n9-27-1.jpg
148 0.01%23/Jun/18 22:11/lab/pictures/20140503-radiation-testing-detector-group-persp-2l.jpg
148 23/Jun/18 22:11/photo/stock/20100126-QPN5505-Bob-detector-board-1.jpg
148 22/Jun/18 01:38/photo/stock/a294-4.html
148 0.01%23/Jun/18 22:11/lab/pictures/20140611-test-plate-back-cables-attached-2l.jpg
148 0.12%23/Jun/18 18:58/lab/hacking-commercial-quantum-cryptography-2010/20100127-QPN5505-Bob-detector-board-Xray-4.jpg
147 23/Jun/18 05:20/photo/stock/n9-24.html
147 23/Jun/18 22:11/lab/pictures/20140612-proton-beam-dump-2l.jpg
147 0.04%23/Jun/18 01:14/lab/pictures/Jin-Gyu-Lim.jpg
147 0.01%23/Jun/18 22:11/lab/pictures/20131220-Quantis-sn100732A410-open-2.jpg
146 22/Jun/18 15:44/listfirm/chemistry.html
146 0.01%23/Jun/18 22:11/lab/pictures/20140614-Jennewein-Anisimova-Makarov-in-Horseshoe-Bay-British-Columbia-Canada-2l.jpg
146 0.02%22/Jun/18 20:33/photo/ultimate-photo-shoot/group2.gif
145 23/Jun/18 08:22/photo/stock/a50-32.html
145 0.01%23/Jun/18 22:11/lab/pictures/20150510-Anisimova-Makarova-Lim-2l.jpg
145 23/Jun/18 22:11/photo/stock/a256-9-1.jpg
145 0.02%23/Jun/18 03:51/photo/stock/a294-19-3.jpg
145 0.01%23/Jun/18 22:11/lab/pictures/20140612-interlock-panel-2l.jpg
145 23/Jun/18 23:50/photo/stock/20100126-QPN5505-Alice-and-Bob.html
144 23/Jun/18 01:18/lab/kirill/
144 0.01%23/Jun/18 22:11/lab/pictures/20140310-satellite-prototype-detector-board-persp-loose-white-2l.jpg
143 0.01%23/Jun/18 22:11/lab/pictures/20140612-irradiation-counter-2l.jpg
143 23/Jun/18 13:29/lab/artem/
143 0.01%23/Jun/18 22:11/photo/stock/20090226-bob-control-experiment-whole-setup-1.jpg
142 0.29%23/Jun/18 11:26/lab/pictures/20170315-quantum-hacking-lab-group-picture.jpg
142 21/Jun/18 23:42/photo/stock/20100630-spy-suitcase-for_Gemini_magazine.html
141 23/Jun/18 22:11/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-10-1h.jpg
141 23/Jun/18 22:11/lab/pictures/20140310-satellite-prototype-detector-board-back-black-2l.jpg
140 22/Jun/18 04:52/korean-blog/vm-and-pohang-mir-dental-clinic-hygienist-20090109-1.jpg
140 23/Jun/18 17:24/photo/stock/20100126-QPN5505-Bob-detector-board.html
140 23/Jun/18 19:38/photo/stock/201203-Anisimova-Makarov.html
139 23/Jun/18 22:11/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-05-1h.jpg
138 23/Jun/18 22:11/lab/pictures/20131011-Clavis-with-dinosaurs-1.jpg
138 22/Jun/18 21:06/photo/stock/a8-20-1.jpg
138 0.01%23/Jun/18 22:11/lab/pictures/20140310-satellite-prototype-detector-board-front-white-2l.jpg
138 23/Jun/18 16:53/photo/dirty-scanner/minolta-dscd2-hotpixel.html
137 0.01%23/Jun/18 22:11/photo/stock/20090705-eavesdropping-experiment-on-nus-campus-map-1.jpg
137 23/Jun/18 17:23/photo/filmform.html
137 0.01%23/Jun/18 22:11/lab/pictures/20140310-satellite-prototype-detector-board-front-black-2l.jpg
137 0.01%23/Jun/18 22:11/lab/pictures/20140611-test-plate-back-2l.jpg
137 23/Jun/18 17:31/photo/stock/a300-28.html
137 23/Jun/18 22:03/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-fiber-power-meter-1l.jpg
136 23/Jun/18 22:11/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-1550nm-laser-1.jpg
136 22/Jun/18 20:46/photo/stock/a256-29.html
136 23/Jun/18 22:11/photo/stock/a282-3-1.jpg
135 21/Jun/18 21:14/photo/stock/a292-20.html
135 23/Jun/18 22:11/photo/stock/a256-21-1.jpg
135 23/Jun/18 22:11/photo/stock/a141-11-1.jpg
135 23/Jun/18 22:11/lab/pictures/La-Palma-JKT-tracking-beam-2-1.jpg
135 23/Jun/18 15:17/photo/stock/n22-27.html
135 0.01%23/Jun/18 22:11/lab/pictures/20160812-Lim-shows-APD-testing-setup-labQNC3301-3-2l.jpg
135 23/Jun/18 22:11/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-11-1h.jpg
135 23/Jun/18 15:17/photo/stock/n8-6.html
134 23/Jun/18 22:11/photo/stock/a294-4-1.jpg
134 21/Jun/18 21:25/photo/stock/a286-36.html
134 21/Jun/18 22:06/photo/stock/a292-32.html
134 23/Jun/18 01:55/photo/stock/n12-29.html
134 23/Jun/18 01:55/photo/stock/n38-3.html
134 23/Jun/18 22:11/lab/pictures/Tenerife-OGS-tracking-beam-2-1.jpg
133 23/Jun/18 22:11/photo/stock/20090106-suitcase-painting-1.jpg
133 23/Jun/18 22:11/photo/stock/a281-33-1.jpg
133 23/Jun/18 23:28/lab/pictures/Tenerife-OGS-tracking-beam-1.jpg
133 23/Jun/18 23:08/photo/stock/a295-5.html
133 23/Jun/18 23:42/photo/stock/a138-29.html
133 21/Jun/18 11:27/photo/stock/a287-6.html
133 23/Jun/18 22:11/photo/stock/a300-28-1cr.jpg
133 21/Jun/18 17:33/photo/stock/n85-2.html
133 23/Jun/18 22:11/lab/pictures/20140310-satellite-prototype-detector-board-back-white-2l.jpg
133 23/Jun/18 09:21/photo/24step-3-16bit.gif
133 21/Jun/18 22:33/photo/stock/a256-15.html
132 0.51%22/Jun/18 22:12/lab/presentations/Makarov-20140930-UWaterloo-phys10-undergrad-seminar.pdf
132 23/Jun/18 17:53/photo/dirty-scanner/faq_scan_en_c4.htm
132 19/Jun/18 09:26/lab/pictures/Jin-Gyu-Lim-2scr.jpg
132 23/Jun/18 17:39/photo/stock/200807-id3110-alice_sn08008F030-bob_sn08008F130.html
132 23/Jun/18 22:11/photo/stock/20100126-QPN5505-Alice-and-Bob-1.jpg
132 23/Jun/18 22:11/lab/pictures/20130523-QHlab-Kaiser-Bennett-Davidovich-1.jpg
132 0.01%23/Jun/18 22:11/lab/pictures/20150401-Darya-IDQ-little-helper-v-2l.jpg
132 23/Jun/18 22:11/photo/stock/200807-id3110-alice_sn08008F030-bob_sn08008F130-1.jpg
131 23/Jun/18 09:36/photo/stock/a256-21.html
131 23/Jun/18 10:29/photo/stock/20090106-suitcase-painting.html
131 21/Jun/18 23:00/photo/stock/a294-19.html
131 23/Jun/18 22:11/photo/stock/20100630-spy-suitcase-for_Gemini_magazine-1.jpg
131 23/Jun/18 22:11/photo/stock/quantum-hacking-group-groenlia20080923-1.jpg
131 23/Jun/18 23:38/photo/stock/201203-Makarov-2.html
131 21/Jun/18 20:36/photo/stock/n99-18.html
131 23/Jun/18 19:40/spbstu.html
131 23/Jun/18 22:36/lab/pictures/La-Palma-JKT-tracking-beam-1.jpg
130 23/Jun/18 17:38/photo/stock/20090705-eavesdropping-experiment-on-nus-campus-map.html
130 0.01%23/Jun/18 22:11/photo/stock/a292-32-1.jpg
130 23/Jun/18 02:02/photo/stock/n65-35.html
130 21/Jun/18 18:53/photo/stock/n22-2.html
130 23/Jun/18 22:11/photo/stock/a286-36-1.jpg
130 23/Jun/18 22:11/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-fiber-power-meter-1.jpg
129 23/Jun/18 01:50/photo/stock/n40-17.html
129 23/Jun/18 22:11/photo/stock/a299-3-1.jpg
129 22/Jun/18 10:32/photo/stock/n17-26-1.jpg
129 23/Jun/18 22:11/photo/stock/20110510-PerkinElmer-SPCM-AQR-13-FC-sn7069-decapsulated-1.jpg
129 23/Jun/18 23:36/listfirm/das.html
129 23/Jun/18 22:11/photo/stock/a256-15-1.jpg
128 23/Jun/18 22:11/photo/stock/a290-32-1.jpg
128 23/Jun/18 18:08/photo/family-archive/vm-20080322-kwanghanru.html
128 23/Jun/18 22:11/photo/stock/20081114-quantum-hacking-group-1.jpg
128 23/Jun/18 21:38/photo/stock/a297-16.html
128 21/Jun/18 20:27/photo/stock/n37-32.html
127 23/Jun/18 02:13/photo/foundview/main.html
127 0.11%22/Jun/18 08:03/publications/sajeed2017.SciRep-7-8403.pdf
127 30/May/18 04:40/lab/pictures/Hao-Qin-2scr.jpg
127 0.01%23/Jun/18 22:11/lab/pictures/20141105-quantum-hacking-lab-group-picture-2l.jpg
127 1.39%23/Jun/18 12:46/lab/chizhov-2004/diploma-chizhov-2004.doc
127 22/Jun/18 04:52/korean-blog/laundry-notice-200709-sel.gif
127 22/Jun/18 04:52/korean-blog/vm-20070604-1s.jpg
127 23/Jun/18 17:40/photo/winners/
126 23/Jun/18 22:11/photo/stock/a285-18-1.jpg
126 21/Jun/18 23:09/photo/stock/a285-18.html
126 0.46%23/Jun/18 17:43/lab/torbjoern/appendix.pdf
126 23/Jun/18 22:11/photo/stock/a297-16-1.jpg
126 21/Jun/18 18:32/photo/stock/a19-1.html
125 23/Jun/18 22:11/photo/stock/a283-14-1.jpg
125 21/Jun/18 23:59/photo/stock/n22-27-1.jpg
125 23/Jun/18 22:11/photo/stock/20110919-Lydersen-defence-group-photo-1.jpg
124 23/Jun/18 22:11/photo/stock/a285-23-1.jpg
124 23/Jun/18 02:05/photo/stock/a11-5.html
124 22/Jun/18 09:20/photo/stock/a105-12.html
124 23/Jun/18 22:11/photo/stock/a294-19-1.jpg
124 0.01%23/Jun/18 22:11/lab/pictures/20140118-IDQ-winter-school-Les-Diablerets-curling-group-photo-cr-3s.jpg
123 23/Jun/18 23:10/photo/dirty-scanner/scan-comparo.html
123 18/Jun/18 20:08/lab/pictures/Ruoping-Li-2scr.jpg
123 23/Jun/18 02:10/photo/stock/a210-34.html
123 23/Jun/18 18:25/photo/stock/a211-36-1.jpg
122 0.02%23/Jun/18 22:55/photo/rebel-viewfinder-3.jpg
122 23/Jun/18 08:53/photo/family-archive/vm-200511.html
122 0.26%23/Jun/18 17:32/lab/pictures/20141125-Wei-Xu-Sajeed-in-quantum-hacking-lab.jpg
122 23/Jun/18 22:11/photo/stock/a295-5-1.jpg
121 23/Jun/18 02:04/photo/dirty-scanner/ls4000-ghosts.html
121 23/Jun/18 22:07/lab/chizhov-2004/
121 23/Jun/18 22:11/photo/stock/a253-25-1.jpg
121 23/Jun/18 17:33/photo/stock/a299-3.html
121 0.01%22/Jun/18 14:40/photo/rebel-viewfinder-2.jpg
121 23/Jun/18 22:11/photo/stock/a292-20-1.jpg
121 23/Jun/18 22:11/photo/stock/a287-6-1.jpg
121 23/Jun/18 22:11/photo/stock/a23-9-1.jpg
120 23/Jun/18 22:11/photo/stock/a291-18-1.jpg
120 23/Jun/18 22:11/photo/stock/a256-29-1.jpg
120 0.23%23/Jun/18 12:09/lab/lecture-fiber_components_course-20031113.pdf
119 23/Jun/18 22:11/photo/stock/a193-1-1.jpg
119 23/Jun/18 08:24/photo/stock/201203-Makarov-1.html
119 23/Jun/18 22:11/lab/hacking-commercial-quantum-cryptography-2010/20100127-QPN5505-Bob-detector-board-Xray-1.gif
119 22/Jun/18 07:12/photo/family-archive/vm-20061224-19.html
119 23/Jun/18 01:42/photo/stock/20110510-PerkinElmer-SPCM-AQR-13-FC-sn7069-decapsulated.html
119 21/Jun/18 22:15/photo/stock/a291-18.html
118 23/Jun/18 21:38/photo/stock/a75-21.html
118 21/May/18 11:41/lab/pictures/no-image.gif
118 23/Jun/18 01:56/lab/press/quantum-luggage-4ebc491-1cr.jpg
118 23/Jun/18 22:11/lab/pictures/20130521-whiteboard-cat-1.jpg
118 23/Jun/18 01:41/lab/poster-minsk-200605/
118 23/Jun/18 05:00/photo/stock/a281-33.html
118 23/Jun/18 22:11/photo/stock/a180-26-1.jpg
118 0.04%23/Jun/18 02:03/lab/paper-vakhitov-2001/paper-vakhitov-2001.pdf
117 21/Jun/18 18:23/photo/stock/n7-16.html
117 0.01%23/Jun/18 22:11/lab/pictures/20180123-IDQ-winter-school-group-picture-snowshoeing-2l.jpg
117 22/Jun/18 12:27/photo/stock/n9-27.html
117 0.01%23/Jun/18 22:11/lab/pictures/20150610-FRISC-workshop-Reykjavik-group-picture-with-superjeep-on-snow-2l.jpg
117 0.01%23/Jun/18 22:11/lab/pictures/20160630-group-photo-at-the-Bund-Shanghai-2l.jpg
117 0.01%23/Jun/18 17:37/publications/IIUMEngJ-12-no5-97.pdf
117 23/Jun/18 02:10/photo/stock/a141-27.html
116 23/Jun/18 02:13/photo/foundview/topbar.html
116 23/Jun/18 22:11/photo/stock/n40-17-1.jpg
115 22/Jun/18 04:52/korean-blog/name.gif
115 23/Jun/18 21:26/photo/stock/a56-2.html
115 23/Jun/18 17:32/photo/stock/a297-31.html
115 22/Jun/18 17:41/photo/stock/a19-1-1.jpg
115 0.54%19/Jun/18 03:12/eve-extract-sifted-key.zip
115 0.73%23/Jun/18 05:17/lab/chizhov-2004/diploma-chizhov-2004.pdf
115 23/Jun/18 22:11/photo/stock/20100615-TropicalQKD-Waterloo-conference-group-picture-1l.jpg
114 0.03%23/Jun/18 16:47/photo/stock/a100-17-4.jpg
114 0.01%23/Jun/18 03:40/photo/stock/a215-19-2.jpg
114 23/Jun/18 22:11/photo/stock/a128-1comp-1.jpg
114 23/Jun/18 17:22/photo/sky/index-ru.html
114 23/Jun/18 02:08/photo/stock/a212-34.html
113 1.30%23/Jun/18 01:34/lab/presentations/Makarov-20170808-SHA2017.pptx
113 23/Jun/18 22:11/lab/pictures/20160118-IDQ-winter-school-group-picture-Peak-walk-2l.jpg
113 21/Jun/18 20:45/photo/stock/n32-18.html
112 23/Jun/18 01:58/photo/stock/a100-17.html
112 23/Jun/18 01:46/photo/stock/20081114-quantum-hacking-group.html
112 0.02%22/Jun/18 14:04/photo/stock/a300-28-3s.jpg
111 23/Jun/18 22:11/lab/pictures/20160118-IDQ-winter-school-group-picture-Glacier-3000-2l.jpg
111 23/Jun/18 08:23/photo/stock/2003.html
111 22/Jun/18 07:39/photo/family-archive/vm-20071203-behind-qkd-setup-at-mimos-kuala-lumpur.html
111 23/Jun/18 22:11/photo/stock/a79-21comp-1.jpg
110 22/Jun/18 14:28/photo/family-archive/vm-20061224-19-2.jpg
110 23/Jun/18 21:13/photo/stock/a135-35.html
110 23/Jun/18 01:57/photo/stock/n12-31.html
110 0.19%23/Jun/18 17:39/photo/family-archive/20110902-Vadim-Makarov-and-bagpiper-ape-at-Heriot-Watt-University-Edinburgh.jpg
109 1.23%23/Jun/18 01:34/lab/presentations/Makarov-20170902-science-cafe-Turku.pptx
109 0.01%23/Jun/18 09:37/new-oacs-20020810-netscape-4_7.gif
109 0.41%23/Jun/18 17:42/publications/poster-makarov-anisimov-sauge-secoqc_vienna200810.pdf
109 23/Jun/18 01:58/photo/stock/a43-12.html
108 21/Jun/18 04:22/photo/stock/a60-7.html
108 23/Jun/18 03:40/photo/folldal/norway-with-folldal-map-en-1.jpg
108 23/Jun/18 07:54/photo/stock/n11-31.html
108 21/Jun/18 17:43/photo/stock/a22-8.html
108 23/Jun/18 02:13/photo/ultimate-photo-shoot/obey-orders.html
107 23/Jun/18 01:59/photo/stock/a230-16.html
107 22/Jun/18 03:43/photo/stock/a104-31.html
107 22/Jun/18 14:24/photo/stock/a211-21-1.jpg
107 0.01%23/Jun/18 22:11/lab/pictures/20150610-FRISC-workshop-Reykjavik-group-picture-in-Secret-Lagoon-2l.jpg
107 22/Jun/18 10:39/photo/stock/a19-6.html
107 23/Jun/18 21:14/photo/stock/a275-4.html
107 0.01%22/Jun/18 23:34/photo/stock/20100126-QPN5505-Bob-detector-board-2.jpg
107 22/Jun/18 03:19/photo/stock/a22-26.html
106 23/Jun/18 01:42/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-10.html
106 23/Jun/18 08:23/photo/stock/1999.html
106 21/Jun/18 19:33/photo/stock/n14-32.html
106 23/Jun/18 17:36/photo/stock/n51-6.html
106 22/Jun/18 18:42/photo/stock/n57-29.html
106 23/Jun/18 08:40/photo/dirty-scanner/canoscanfs2710-ccd-leakage.html
106 0.97%23/Jun/18 01:35/lab/presentations/Makarov-20160803-12-QIC891-lectures-3-4.pptx
106 23/Jun/18 01:50/photo/stock/a79-21comp.html
105 23/Jun/18 01:41/photo/stock/a290-32.html
105 22/Jun/18 01:11/photo/family-archive/arc-im2.html
105 0.61%21/Jun/18 21:37/lab/torbjoern/main.pdf
105 21/Jun/18 17:52/photo/stock/n8-31.html
104 0.01%23/Jun/18 09:54/photo/stock/a299-3-2s.jpg
104 21/Jun/18 20:17/photo/stock/n30-32.html
104 23/Jun/18 02:22/photo/stock/n100-30.html
104 23/Jun/18 04:20/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-11.html
104 0.01%23/Jun/18 09:36/oacs-20021112-layout-netscape-4_7.gif
104 23/Jun/18 19:14/photo/stock/a18-33.html
104 23/Jun/18 05:24/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-1550nm-laser-1l.jpg
103 23/Jun/18 18:55/photo/stock/a134-7.html
103 0.14%23/Jun/18 17:07/lab/poster-minsk-200605/poster-minsk-200605.jpg
103 23/Jun/18 02:03/photo/dirty-scanner/photosmart-grid.html
103 23/Jun/18 02:19/photo/stock/a82-8.html
103 21/Jun/18 20:54/photo/stock/n37-15.html
103 23/Jun/18 11:24/photo/stock/n20-13.html
103 23/Jun/18 02:09/photo/stock/a215-3.html
103 0.01%22/Jun/18 08:29/lab/hacking-commercial-quantum-cryptography-2010/20100127-QPN5505-Bob-detector-board-Xray-2.gif
103 23/Jun/18 22:11/lab/jolly-phi-1.gif
103 23/Jun/18 07:20/lab/jolly-phi-h252.gif
102 23/Jun/18 02:08/photo/stock/a213-32.html
102 21/Jun/18 22:25/photo/stock/a108-25.html
102 0.01%22/Jun/18 05:23/photo/stock/20100126-QPN5505-Alice-and-Bob-2.jpg
102 0.56%21/Jun/18 15:16/lab/publications/Simonsen-Master-thesis-20100611.pdf
102 0.01%22/Jun/18 10:15/photo/stock/200807-id3110-alice_sn08008F030-bob_sn08008F130-2.jpg
102 23/Jun/18 01:48/photo/stock/20100615-TropicalQKD-Waterloo-conference-group-picture.html
102 23/Jun/18 23:30/photo/stock/n27-17.html
102 22/Jun/18 03:27/photo/stock/a104-36.html
101 23/Jun/18 08:24/photo/stock/a27-36.html
101 23/Jun/18 23:20/photo/stock/a210-25.html
101 22/Jun/18 03:11/photo/stock/n13-36.html
101 23/Jun/18 08:24/photo/stock/2000.html
101 23/Jun/18 01:56/photo/stock/a92-20.html
101 0.04%22/Jun/18 23:47/lab/paper-makarov-2004/paper-makarov-2004.pdf
101 23/Jun/18 17:14/photo/stock/a210-16.html
101 23/Jun/18 01:58/photo/stock/n8-23.html
101 23/Jun/18 21:20/lab/hacking-commercial-quantum-cryptography-2010/20081211-id3110-detector-board-front-2.jpg
100 23/Jun/18 04:58/photo/stock/a128-1comp.html
100 22/Jun/18 11:45/photo/stock/1997.html
100 23/Jun/18 02:08/photo/stock/a213-29.html
100 22/Jun/18 19:27/lab/hacking-commercial-quantum-cryptography-2010/20081211-id3110-detector-board-back-2.jpg
99 0.14%22/Jun/18 10:50/publications/sajeed2015.PhysRevA-91-032326.pdf
99 23/Jun/18 01:56/photo/stock/n89-16.html
99 0.01%23/Jun/18 09:32/photo/stock/a297-16-2.jpg
99 23/Jun/18 01:55/photo/stock/a12-24.html
99 23/Jun/18 22:48/photo/stock/n87-15.html
99 0.12%22/Jun/18 04:47/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-05-4.jpg
98 23/Jun/18 08:22/photo/stock/2002.html
98 23/Jun/18 08:22/photo/stock/2009.html
98 23/Jun/18 17:07/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-05-1.jpg
98 23/Jun/18 02:12/photo/stock/a6-7.html
98 23/Jun/18 08:22/photo/stock/2001.html
97 23/Jun/18 22:11/lab/bestposter-flaam2002-1.gif
97 0.03%22/Jun/18 16:36/publications/PhysRevA-74-022313-and-erratum-PhysRevA-78-019905.pdf
97 23/Jun/18 02:08/photo/stock/a213-10.html
97 0.56%21/Jun/18 22:22/publications/makarov-presentation-attacks-exploiting-component-imperfections-200810.pdf
97 0.13%21/Jun/18 19:43/lab/pictures/20160812-Lim-shows-APD-testing-setup-labQNC3301-2.jpg
97 23/Jun/18 08:24/photo/stock/2012.html
97 23/Jun/18 14:33/sitemap.xml
96 23/Jun/18 02:21/lab/nor-crypto-200210.html
96 23/Jun/18 02:01/photo/stock/n17-26.html
96 23/Jun/18 01:57/photo/stock/n8-8.html
95 23/Jun/18 03:03/lab/webmaster.html
95 23/Jun/18 02:00/photo/fingerprints-warning.html
95 22/Jun/18 06:35/publications/paper-filippov-1999.html
95 23/Jun/18 01:43/photo/stock/a60-19.html
95 23/Jun/18 08:24/photo/stock/2008.html
95 23/Jun/18 02:18/photo/stock/a43-36.html
95 0.04%23/Jun/18 00:13/publications/RevSciInstrum-82-093110.pdf
94 0.06%22/Jun/18 05:55/publications/OptExpress-19-23590.pdf
94 0.09%22/Jun/18 16:45/publications/sajeed2016.PhysRevLett-117-250505-with-supplementary.pdf
94 21/Jun/18 16:54/photo/stock/2010.html
94 21/Jun/18 18:42/photo/stock/n8-8-1.jpg
94 22/Jun/18 14:28/photo/stock/n14-32-1.jpg
94 23/Jun/18 02:03/photo/dirty-scanner/minolta-dscmulti-illuminator-black-spot.html
94 22/Jun/18 01:20/photo/family-archive/arc-im1.html
94 22/Jun/18 06:26/publications/paper-filippov-2000.html
93 23/Jun/18 01:43/photo/stock/a256-9.html
93 23/Jun/18 17:07/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-11-1.jpg
93 22/Jun/18 01:36/photo/family-archive/vm-20061224-16.html
93 23/Jun/18 02:15/photo/stock/a176-22.html
93 21/Jun/18 16:06/photo/stock/a210-12-1.jpg
93 23/Jun/18 16:50/photo/stock/a141-7.html
92 23/Jun/18 08:22/photo/stock/2005.html
92 23/Jun/18 03:51/photo/stock/a211-21.html
92 0.01%23/Jun/18 13:37/korean-blog/vm-20070604-3.jpg
92 23/Jun/18 02:09/photo/stock/a211-4.html
92 23/Jun/18 22:32/photo/stock/n29-5.html
92 23/Jun/18 08:22/photo/stock/2007.html
92 22/Jun/18 07:00/publications/paper-filippov-1999b.html
91 22/Jun/18 14:25/photo/stock/a208-31-1.jpg
91 23/Jun/18 02:06/photo/stock/a211-36.html
91 23/Jun/18 02:10/photo/stock/a215-19.html
91 23/Jun/18 11:18/photo/stock/n67-3.html
91 23/Jun/18 01:55/photo/stock/n46-28.html
91 23/Jun/18 01:56/photo/stock/n9-29.html
91 22/Jun/18 03:03/photo/stock/a105-6.html
90 0.43%22/Jun/18 23:13/lab/presentations/IDQ_winter_school_20120125-Loopholes-in-implementations-of-quantum-cryptography.pdf
90 23/Jun/18 15:22/photo/stock/a212-28.html
90 23/Jun/18 01:56/photo/stock/n46-8.html
90 23/Jun/18 08:23/photo/stock/2011.html
90 23/Jun/18 02:10/photo/stock/a146-33.html
90 21/Jun/18 07:22/photo/stock/a8-20.html
90 23/Jun/18 17:07/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-10-1.jpg
89 23/Jun/18 05:36/photo/stock/a215-4.html
89 23/Jun/18 02:37/photo/stock/a181-12.html
89 23/Jun/18 02:11/photo/stock/a133-27.html
89 0.06%23/Jun/18 17:20/lab/pictures/20160805-Curty-in-labQNC3303.jpg
89 23/Jun/18 02:06/photo/stock/a211-25.html
89 21/Jun/18 19:56/photo/stock/n44-16-1.jpg
89 23/Jun/18 02:13/photo/ultimate-photo-shoot/clinton.html
89 23/Jun/18 01:58/photo/stock/a99-12.html
89 23/Jun/18 14:30/photo/stock/n7-18.html
89 23/Jun/18 02:07/photo/stock/a210-12.html
89 0.03%23/Jun/18 03:07/publications/ProcOptSocKoreaAnnualMeeting2008-417.pdf
89 22/Jun/18 03:35/photo/stock/a104-30.html
88 23/Jun/18 01:47/photo/stock/quantum-hacking-group-groenlia20080923.html
88 23/Jun/18 02:10/photo/stock/a146-24.html
88 23/Jun/18 08:23/photo/stock/2006.html
88 23/Jun/18 01:56/lab/press/20120907-Makarov-Jennewein-for-TheRecord-1.jpg
88 0.01%22/Jun/18 13:03/photo/stock/a212-34-4.jpg
88 23/Jun/18 15:10/publications/CLEO_IQEC_2009-kim-makarov-jeong-kim.pdf
20 23/Jun/18 00:58  /publications/CLEO_IQEC_2009-kim-makarov-jeong-kim.pdf?origin=publication_detail
88 23/Jun/18 02:09/photo/stock/a215-6.html
88 21/Jun/18 18:17/photo/stock/n12-29-1.jpg
88 22/Jun/18 17:17/korean-blog/laundry-notice-200709.gif
88 0.08%22/Jun/18 07:41/lab/pictures/20141031-pumpkin-with-Anqi-Huang.jpg
88 20/Jun/18 04:22/photo/stock/n37-27.html
88 0.03%22/Jun/18 17:45/lab/paper-makarov-2005/paper-makarov-2005.pdf
88 23/Jun/18 07:36/photo/stock/a208-31.html
88 0.17%22/Jun/18 14:05/publications/huang2016.IEEEJQuantumElectron-52-8000211.pdf
88 23/Jun/18 02:22/photo/stock/n98-5.html
87 0.02%22/Jun/18 14:02/publications/xu2014.QCrypt2014.pdf
87 23/Jun/18 20:18/photo/faa-regulation-108.pdf
87 23/Jun/18 02:07/photo/stock/a210-18.html
87 22/Jun/18 19:23/photo/family-archive/pattern-blending.html
87 23/Jun/18 18:52/photo/stock/a214-33.html
87 23/Jun/18 04:48/photo/stock/a147-33.html
86 0.03%22/Jun/18 08:16/publications/xu2015.PhysRevA-92-032305.pdf
86 23/Jun/18 01:56/photo/stock/a92-17.html
86 23/Jun/18 02:19/photo/stock/a67-23.html
86 22/Jun/18 17:41/photo/stock/n30-32-1.jpg
86 22/Jun/18 14:24/photo/stock/a212-11-1.jpg
86 23/Jun/18 02:25/photo/stock/n39-35.html
86 0.01%22/Jun/18 19:11/photo/stock/a300-28-2cr.jpg
85 23/Jun/18 02:07/photo/stock/a208-36.html
85 23/Jun/18 01:45/photo/stock/a141-11.html
85 21/Jun/18 16:06/photo/stock/a212-20-1.jpg
85 23/Jun/18 15:53/photo/stock/a213-32-1.jpg
85 20/Jun/18 06:55/photo/stock/n9-24-1.jpg
85 23/Jun/18 01:48/photo/stock/a23-9.html
85 23/Jun/18 11:47/photo/stock/a212-11.html
85 23/Jun/18 07:54/photo/stock/n61-26.html
85 23/Jun/18 04:54/photo/stock/a138-29-1.jpg
85 23/Jun/18 02:26/photo/stock/a251-28.html
85 23/Jun/18 02:07/photo/stock/a212-23.html
85 23/Jun/18 01:45/photo/stock/a140-33.html
84 23/Jun/18 02:13/photo/stock/a193-17crop.html
84 23/Jun/18 02:06/photo/stock/a11-29.html
84 23/Jun/18 01:57/photo/stock/a14-6.html
84 23/Jun/18 02:07/photo/stock/a209-21.html
84 23/Jun/18 01:58/photo/stock/n28-36.html
84 22/Jun/18 02:25/photo/stock/minimum-disturbance-measurement-setup-20080418-3.html
84 23/Jun/18 08:22/photo/stock/2004.html
84 23/Jun/18 01:49/photo/stock/a180-26.html
84 23/Jun/18 01:45/photo/stock/a5-17.html
84 23/Jun/18 20:31/photo/stock/a141-36.html
84 23/Jun/18 02:09/photo/stock/a214-26.html
84 23/Jun/18 02:08/photo/stock/a213-15.html
83 23/Jun/18 01:48/photo/stock/a253-25.html
83 23/Jun/18 11:41/photo/stock/n97-37.html
83 23/Jun/18 14:59/photo/stock/a215-12.html
83 23/Jun/18 02:26/photo/stock/a253-8.html
82 0.01%23/Jun/18 18:01/photo/dirty-scanner/minolta-dscd2-hotpixel-3.jpg
82 23/Jun/18 01:58/photo/stock/n90-33.html
82 23/Jun/18 01:58/photo/stock/n8-4.html
82 0.82%23/Jun/18 01:37/lab/presentations/Makarov-20150908-Norsk-kryptoseminar-Trondheim.pptx
82 22/Jun/18 10:05/photo/24step-3.gif
82 23/Jun/18 01:59/photo/stock/a230-5.html
82 21/Jun/18 16:32/photo/ultimate-photo-shoot/allguys.gif
82 23/Jun/18 01:49/photo/stock/a193-1.html
82 23/Jun/18 02:04/photo/stock/n20-1orig.html
82 23/Jun/18 09:29/photo/stock/a212-20.html
82 23/Jun/18 02:08/photo/stock/a214-5.html
81 23/Jun/18 16:19/photo/stock/a210-18-1.jpg
81 23/Jun/18 02:23/photo/stock/n13-24.html
81 23/Jun/18 05:22/photo/stock/a209-21-1.jpg
81 23/Jun/18 02:02/lab/press/20130427-Makarov-for-TheRecord-1.jpg
81 0.01%22/Jun/18 15:39/korean-blog/vm-and-pohang-mir-dental-clinic-hygienist-20090109-3.jpg
81 23/Jun/18 01:41/photo/stock/20090226-bob-control-experiment-eve-faked-state-generator.html
81 21/Jun/18 23:17/korean-blog/email-from-kornor-mogat-go-kr-20081114.txt
81 23/Jun/18 01:46/photo/stock/20110919-Lydersen-defence-group-photo.html
80 23/Jun/18 02:04/photo/stock/a65-32.html
80 0.51%23/Jun/18 01:35/lab/presentations/Makarov-20160914-QCrypt-WashingtonDC-tutorial.pptx
80 0.03%20/Jun/18 17:13/lab/alexey/diploma-ru.doc
80 23/Jun/18 17:13/photo/stock/a213-10-1.jpg
80 23/Jun/18 02:11/photo/stock/a134-13.html
80 23/Jun/18 02:08/photo/stock/a213-34.html
80 22/Jun/18 21:54/photo/stock/a208-36-1.jpg
80 22/Jun/18 21:32/photo/24step-2.gif
80 23/Jun/18 01:41/lab/present-attacks-via-optical-loopholes-erlangen-200409/
80 23/Jun/18 02:33/photo/stock/a215-12-1.jpg
80 23/Jun/18 01:56/photo/stock/a92-2.html
80 23/Jun/18 02:20/photo/stock/a98-3.html
79 23/Jun/18 02:16/photo/stock/a181-15.html
79 23/Jun/18 04:43/photo/foundview/aboutfv/fvart.html
79 23/Jun/18 01:56/photo/stock/a92-7.html
79 23/Jun/18 19:12/photo/stock/n8-32q.html
79 23/Jun/18 02:20/photo/stock/a106-3.html
79 23/Jun/18 20:01/photo/stock/a84-28.html
79 0.61%23/Jun/18 01:36/lab/presentations/Makarov-Huang-20151102-seminars-in-Korea-China-superset.pptx
79 23/Jun/18 03:20/photo/stock/a27-20.html
79 0.20%23/Jun/18 07:24/publications/paper-filippov-1999b.pdf
78 22/Jun/18 22:23/photo/stock/a209-6-1.jpg
78 0.65%19/Jun/18 11:30/lab/presentations/Makarov-20160803-12-QIC891-lectures-3-4.pdf
78 23/Jun/18 02:18/photo/stock/a24-26.html
78 23/Jun/18 18:47/photo/stock/n11-33.html
78 0.01%20/Jun/18 17:55/photo/dirty-scanner/pcd-ccd-leakage-3.jpg
78 0.17%18/Jun/18 06:58/photo/stock/a230-5-5.jpg
78 0.21%23/Jun/18 08:46/lab/kirill/diploma.doc
78 23/Jun/18 05:30/photo/family-archive/20131011-Makarov-IQC-1scr.jpg
77 0.03%22/Jun/18 13:44/publications/maroy2017.QuantumSciTechnol-2-044013.pdf
77 0.07%22/Jun/18 12:56/publications/chaiwongkhot2017.QCrypt2017-subm86.pdf
77 0.01%23/Jun/18 19:30/photo/stock/n46-28-3.jpg
77 0.11%22/Jun/18 16:19/publications/jain2014.NewJPhys-16-123030.pdf
77 21/Jun/18 16:06/photo/stock/a210-34-1s.jpg
77 22/Jun/18 17:41/photo/stock/n8-31-1.jpg
77 23/Jun/18 01:56/lab/press/VG_Fredag-20101105-p26-29-spread1-1cr.jpg
77 23/Jun/18 20:31/photo/stock/a181-2.html
76 22/Jun/18 20:26/photo/stock/a212-23-1.jpg
76 23/Jun/18 01:55/photo/stock/n54-17.html
76 23/Jun/18 17:35/lab/jolly-phi.gif
76 0.06%22/Jun/18 11:21/publications/sajeed2015.PhysRevA-91-062301.pdf
76 23/Jun/18 13:21/photo/stock/a14-30.html
76 23/Jun/18 07:06/photo/stock/a209-6.html
76 23/Jun/18 01:58/photo/stock/n58-33.html
76 0.03%23/Jun/18 16:12/photo/stock/n46-28-4.jpg
76 22/Jun/18 23:24/photo/stock/a214-26-1.jpg
75 23/Jun/18 19:50/photo/stock/a100-24.html
75 22/Jun/18 21:10/photo/stock/a215-4-1.jpg
75 0.04%23/Jun/18 12:37/photo/stock/a256-29-4.jpg
75 23/Jun/18 02:23/photo/stock/a18-16.html
75 23/Jun/18 06:03/photo/stock/a274-33.html
75 23/Jun/18 15:06/photo/stock/a251-19.html
75 0.04%23/Jun/18 13:18/publications/CLEO_Europe_EQEC_2011-Makarov.pdf
75 23/Jun/18 18:40/photo/stock/a215-3-1.jpg
75 21/Jun/18 19:39/photo/n17-26-1-15bit.jpg
75 23/Jun/18 02:24/photo/stock/n24-27.html
75 0.32%23/Jun/18 12:11/publications/anisimova2017.EPJQuantumTechnol-4-10.pdf
75 23/Jun/18 19:15/photo/stock/a210-16-1.jpg
75 22/Jun/18 17:41/photo/stock/n7-16-1.jpg
75 22/Jun/18 17:15/photo/stock/n23-17-1.jpg
74 23/Jun/18 01:56/lab/press/20171106-ITMO-group-photo-2l.jpg
74 23/Jun/18 01:56/photo/stock/a14-3.html
74 21/Jun/18 23:31/photo/stock/a213-15-1.jpg
74 23/Jun/18 02:23/photo/stock/a17-21.html
74 0.80%23/Jun/18 01:37/lab/presentations/Makarov-20150820-QKD-graduate-school-Waterloo.pptx
74 23/Jun/18 02:04/photo/stock/a132-8.html
74 23/Jun/18 02:20/photo/stock/n54-5.html
74 21/Jun/18 16:06/photo/stock/a213-34-1.jpg
74 23/Jun/18 08:04/photo/stock/a212-28-1.jpg
74 21/Jun/18 16:06/photo/stock/a210-25-1.jpg
74 23/Jun/18 03:44/photo/stock/a141-27-1s.jpg
74 0.78%22/Jun/18 18:16/lab/presentations/Makarov-20140801-IQC-short-course.pdf
73 23/Jun/18 18:21/photo/stock/a213-29-1.jpg
73 21/Jun/18 16:06/photo/stock/a212-34-1.jpg
73 23/Jun/18 02:12/photo/stock/n44-16.html
73 0.01%21/Jun/18 07:37/photo/stock/20100630-spy-suitcase-for_Gemini_magazine-3.jpg
73 23/Jun/18 00:21/photo/stock/a133-5-1.jpg
73 23/Jun/18 07:12/photo/foundview/about.html
73 23/Jun/18 02:20/photo/stock/n55-23.html
73 0.21%23/Jun/18 09:11/lab/presentations/CCC_20091227-How-you-can-build-an-eavesdropper-for-a-quantum-cryptosystem.pptx
72 0.08%22/Jun/18 13:10/publications/pugh2017.QuantumSciTechnol-2-024009.pdf
72 0.58%20/Jun/18 10:50/lab/presentations/Makarov-20160120-IDQ-winter-school.pdf
72 23/Jun/18 01:42/photo/stock/a282-3.html
72 0.05%22/Jun/18 12:20/publications/bugge2014.PhysRevLett-112-070503.pdf
72 23/Jun/18 02:21/photo/stock/n81-1.html
72 23/Jun/18 02:20/photo/stock/a98-9.html
71 23/Jun/18 02:17/photo/stock/a135-29.html
71 23/Jun/18 02:12/photo/stock/n25-13.html
71 23/Jun/18 02:15/photo/stock/a177-1.html
71 23/Jun/18 02:24/photo/stock/n17-31.html
71 23/Jun/18 02:29/photo/stock/a177-16.html
71 0.09%23/Jun/18 08:10/publications/tanner2014.OptExpress-22-6734.pdf
71 21/Jun/18 02:02/photo/stock/a43-12-1.jpg
71 23/Jun/18 05:51/photo/stock/a211-4-1s.jpg
71 22/Jun/18 17:41/photo/stock/n37-32-1.jpg
71 0.74%23/Jun/18 10:45/lab/presentations/IDQ_winter_school_20130122-Loopholes-in-implementations-of-quantum-cryptography.ppt
70 23/Jun/18 16:46/photo/stock/a41-34.html
70 0.63%22/Jun/18 22:31/lab/presentations/HAR_20090814-How-we-eavesdropped-100percent-of-a-quantum-crypto-key.ppt
70 0.02%23/Jun/18 14:46/publications/PhysRevA-84-032320.pdf
70 23/Jun/18 02:14/photo/stock/a193-29crop.html
70 0.02%23/Jun/18 16:45/photo/stock/n7-16-4.jpg
70 23/Jun/18 02:55/photo/stock/a214-5-1.jpg
70 0.02%23/Jun/18 23:33/publications/PhysRevA-83-032306.pdf
70 23/Jun/18 02:16/photo/stock/a123-5.html
69 19/Jun/18 13:39/photo/ultimate-photo-shoot/paul.gif
69 23/Jun/18 02:25/photo/stock/n42-28.html
69 21/Jun/18 06:09/photo/stock/n22-2-1.jpg
69 21/Jun/18 16:06/photo/stock/a215-6-1.jpg
69 22/Jun/18 17:41/photo/stock/a22-8-1.jpg
69 23/Jun/18 01:41/lab/lecture-fiber_components_course-20031113.html
69 0.28%19/Jun/18 21:42/lab/publications/simonsen-student-project-report-20091217.pdf
69 23/Jun/18 02:21/photo/stock/n84-28.html
68 23/Jun/18 02:17/photo/stock/a130-36.html
68 23/Jun/18 01:42/photo/stock/a283-14.html
68 23/Jun/18 02:17/photo/stock/a147-9.html
68 23/Jun/18 02:03/photo/stock/n51-6-1.jpg
68 0.11%23/Jun/18 18:00/lab/nor-crypto-200210.pdf
68 23/Jun/18 02:12/photo/stock/n72-24.html
68 23/Jun/18 02:15/photo/stock/a225-35.html
67 23/Jun/18 02:10/photo/stock/a131-19.html
67 19/Jun/18 15:12/photo/ultimate-photo-shoot/shirilla.gif
67 0.39%23/Jun/18 01:38/lab/presentations/Makarov-20150710-Telecom-ParisTech.pptx
67 23/Jun/18 02:04/photo/stock/a133-5.html
67 23/Jun/18 18:17/photo/stock/n20-1orig-1.jpg
67 20/Jun/18 02:04/photo/stock/a75-21-1.jpg
67 23/Jun/18 02:18/photo/stock/a25-27.html
67 0.01%22/Jun/18 19:38/photo/stock/n8-8-4.jpg
67 23/Jun/18 02:23/photo/stock/n8-9.html
67 23/Jun/18 22:13/photo/stock/n22-13.html
66 23/Jun/18 08:06/photo/stock/a17-8.html
66 23/Jun/18 18:12/photo/stock/a132-8-1.jpg
66 19/Jun/18 23:41/photo/stock/a65-32-1.jpg
66 23/Jun/18 14:59/photo/stock/a27-17.html
66 0.11%23/Jun/18 23:28/publications/anisimova2015.SPW2015-subm107.pdf
66 23/Jun/18 04:43/photo/stock/20100615-TropicalQKD-Waterloo-conference-group-picture-5.html
66 23/Jun/18 20:34/photo/stock/a23-28.html
66 22/Jun/18 17:44/photo/stock/a214-33-1s.jpg
65 0.10%22/Jun/18 19:12/lab/pictures/20141105-quantum-hacking-lab-group-picture.jpg
65 19/Jun/18 23:41/photo/stock/n20-1-1.jpg
65 0.01%20/Jun/18 04:24/photo/stock/a123-5-4.jpg
65 23/Jun/18 22:08/oacs-20021112-layout-ie50.gif
65 0.12%22/Jun/18 08:25/lab/pictures/20141126-Lim-in-quantum-hacking-lab.jpg
65 23/Jun/18 19:42/photo/stock/n57-29-1.jpg
65 0.03%22/Jun/18 18:13/photo/stock/n7-18-4.jpg
65 23/Jun/18 02:12/photo/stock/a7-24.html
65 23/Jun/18 22:44/photo/stock/n9-1.html
64 0.02%22/Jun/18 07:34/publications/PhysRevLett-107-170404.pdf
64 0.01%22/Jun/18 14:45/publications/paper-filippov-2000.pdf
64 22/Jun/18 17:41/photo/stock/a19-6-1.jpg
64 0.01%23/Jun/18 09:11/photo/dirty-scanner/canoscanfs2710-ccd-leakage.jpg
64 0.06%22/Jun/18 10:36/publications/NewJPhys-11-065003.pdf
64 23/Jun/18 02:23/photo/stock/n14-6.html
64 23/Jun/18 18:47/photo/stock/a225-14.html
64 22/Jun/18 07:38/photo/family-archive/20121212-Makarov-1.jpg
64 19/Jun/18 23:41/photo/stock/n99-18-1.jpg
64 23/Jun/18 02:21/photo/stock/n63-10.html
64 23/Jun/18 02:26/photo/stock/a252-32.html
64 0.05%23/Jun/18 17:59/publications/liu2014.RevSciInstrum-85-013108.pdf
63 0.09%22/Jun/18 17:35/photo/stock/a286-36-5.jpg
63 22/Jun/18 17:41/photo/stock/n32-18-1.jpg
63 22/Jun/18 17:41/photo/stock/n11-31-1.jpg
63 0.57%20/Jun/18 04:30/lab/presentations/Makarov-20150908-Norsk-kryptoseminar-Trondheim.pdf
63 0.01%22/Jun/18 23:07/photo/stock/n11-15-3.jpg
63 23/Jun/18 02:17/photo/stock/a147-16.html
63 23/Jun/18 01:59/photo/stock/n37-15orig.html
63 23/Jun/18 02:21/photo/stock/n80-33.html
63 22/Jun/18 11:45/photo/stock/a9-19-3.jpg
63 23/Jun/18 02:15/photo/stock/a178-33.html
63 23/Jun/18 02:25/photo/stock/n40-2.html
63 23/Jun/18 03:51/photo/stock/n99-24.html
63 23/Jun/18 18:47/photo/stock/a179-4.html
62 23/Jun/18 02:16/photo/stock/a191-9.html
62 22/Jun/18 07:38/graphics/black.gif
62 0.10%20/Jun/18 00:59/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-11-4.jpg
62 0.20%23/Jun/18 01:44/lab/publications/huang2018.thesis-PhD.pdf
62 23/Jun/18 02:24/photo/stock/n28-20.html
62 0.04%23/Jun/18 08:22/photo/family-archive/20131011-Makarov-IQC-4cr.jpg
62 0.01%22/Jun/18 01:09/photo/stock/a210-12-3.jpg
62 23/Jun/18 02:22/photo/stock/n97-21.html
62 23/Jun/18 02:11/photo/stock/a72-30.html
61 23/Jun/18 02:10/photo/stock/a134-18.html
61 19/Jun/18 23:41/photo/stock/n22-13-1.jpg
61 23/Jun/18 02:23/photo/stock/n9-20.html
61 23/Jun/18 02:12/photo/stock/a7-7.html
61 23/Jun/18 09:36/photo/stock/a3-13.html
61 23/Jun/18 02:15/photo/stock/a225-34.html
61 0.31%23/Jun/18 01:38/lab/presentations/Makarov-20141007-ETSI-quantum-safe-crypto-workshop-Ottawa.pptx
61 23/Jun/18 04:43/photo/stock/a253-25-5.html
60 0.04%23/Jun/18 17:42/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-fiber-power-meter-5.jpg
60 0.04%23/Jun/18 05:41/publications/QCMC_2012-Bugge.pdf
60 23/Jun/18 02:15/photo/stock/a225-36.html
60 23/Jun/18 02:14/photo/stock/a204-3.html
60 23/Jun/18 05:39/photo/stock/a194-15crop.html
60 23/Jun/18 04:43/photo/foundview/dload/
60 23/Jun/18 02:37/photo/stock/a74-3.html
59 0.57%22/Jun/18 08:04/publications/phd-thesis-makarov-200703.doc
59 23/Jun/18 02:21/photo/stock/n56-25.html
59 0.11%23/Jun/18 02:02/photo/stock/201203-Makarov-2-5.jpg
59 0.24%22/Jun/18 18:02/lab/presentations/Makarov-20170902-science-cafe-Turku.pdf
59 0.03%23/Jun/18 18:54/photo/stock/n23-17-4.jpg
59 22/Jun/18 17:41/photo/stock/n37-15-1.jpg
59 0.04%20/Jun/18 13:17/lab/publications/bugge2014.PhysRevLett-112-no7-cover.pdf
59 0.10%22/Jun/18 19:49/photo/stock/20100126-QPN5505-Alice-and-Bob-5.jpg
58 22/Jun/18 19:05/photo/ultimate-photo-shoot/smgrp.gif
58 0.03%23/Jun/18 04:53/photo/stock/a104-31-4.jpg
58 0.03%23/Jun/18 01:31/publications/chaiwongkhot2016.TyQI.pdf
58 23/Jun/18 02:24/photo/stock/n20-32.html
58 0.08%20/Jun/18 17:14/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-10-4.jpg
58 0.14%22/Jun/18 21:24/photo/stock/201203-Anisimova-Makarov-5.jpg
58 22/Jun/18 04:04/photo/group-photo-coupon-4.gif
58 23/Jun/18 04:43/photo/foundview/finalfv/fvcom.html
58 0.02%22/Jun/18 04:13/publications/QCMC_2012-Jain.pdf
58 23/Jun/18 02:24/photo/stock/n18-24.html
58 23/Jun/18 02:25/photo/stock/n42-20.html
58 0.01%22/Jun/18 11:29/publications/sultana2017.QCrypt2017-subm152.pdf
58 0.05%23/Jun/18 11:38/publications/NewJPhys-13-113042.pdf
58 23/Jun/18 02:14/photo/stock/a205-7.html
58 23/Jun/18 02:24/photo/stock/n23-28.html
57 0.10%17/Apr/18 21:51/adhoc/20180409gvhgvrghfg/Makarov-brief.pptx
57 23/Jun/18 02:21/photo/stock/n95-11.html
57 23/Jun/18 04:52/lab/publications/bugge2014.PhysRevLett-112-no7-cover-2.jpg
57 23/Jun/18 04:43/photo/stock/a193-1-5.html
57 23/Jun/18 02:18/photo/stock/a24-34.html
57 23/Jun/18 02:18/photo/stock/a41-20.html
57 23/Jun/18 02:10/photo/stock/a131-22.html
57 23/Jun/18 02:25/photo/stock/n7-26.html
57 0.25%19/Jun/18 23:56/lab/presentations/Makarov-20160914-QCrypt-WashingtonDC-tutorial.pdf
56 19/Jun/18 23:41/photo/stock/a104-30-1.jpg
56 23/Jun/18 02:25/photo/stock/n8-32.html
56 0.46%23/Jun/18 04:12/lab/presentations/IDQ_winter_school_20120125-Loopholes-in-implementations-of-quantum-cryptography.ppt
56 22/Jun/18 06:16/photo/stock/n89-36-3.jpg
56 0.02%23/Jun/18 17:36/publications/PhysRevLett-107-110501.pdf
56 0.03%22/Jun/18 21:38/publications/diploma-makarov-1998-report_en.pdf
56 0.10%20/Jun/18 14:17/lab/pictures/20140612-Rados-RDS-30-dosimeter.jpg
56 0.04%23/Jun/18 17:26/lab/hacking-commercial-quantum-cryptography-2010/20100217-Makarov-and-Lydersen-visiting-IDQ-pizza2.jpg
56 0.01%21/Jun/18 07:21/photo/stock/a210-34-3.jpg
56 23/Jun/18 02:01/photo/stock/20100630-spy-suitcase-for_Gemini_magazine-2.jpg
56 0.01%18/Jun/18 18:05/photo/stock/n8-4-3.jpg
55 0.06%23/Jun/18 13:40/publications/OptExpress-18-27938.pdf
55 19/Jun/18 23:41/photo/stock/n85-2-1.jpg
55 23/Jun/18 06:24/photo/stock/a281-33-2.jpg
55 23/Jun/18 02:20/photo/stock/a106-19.html
55 23/Jun/18 18:36/photo/dirty-scanner/neg-flare-3.jpg
55 23/Jun/18 04:43/photo/foundview/aboutfv/fvphil.html
55 23/Jun/18 02:13/photo/stock/a285-7.html
55 23/Jun/18 02:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/
54 0.11%21/Jun/18 07:32/lab/pictures/20141218-lab-QNC3301-construction-Makarov-testing-shelf.jpg
54 0.01%19/Jun/18 10:32/photo/stock/a17-21-4.jpg
54 23/Jun/18 11:16/photo/stock/a132-4.html
54 22/Jun/18 10:24/photo/dirty-scanner/halo-sample1-3.jpg
54 0.06%23/Jun/18 07:51/lab/poster-minsk-200605/poster-minsk-200605.pdf
54 0.15%21/Jun/18 19:41/publications/makarov-presentation-attacks-exploiting-component-imperfections-200810-handouts.pdf
54 0.21%22/Jun/18 13:26/publications/sajeed2017.ICNFP2017-subm1046-poster.pdf
54 0.02%23/Jun/18 04:00/photo/stock/n40-2-4.jpg
54 22/Jun/18 19:39/lab/pictures/QNC3-20110822-2.jpg
53 21/Jun/18 07:22/photo/stock/a212-34-3.jpg
53 0.53%21/Jun/18 22:18/lab/publications/lim2018.thesis-MSc.pdf
53 23/Jun/18 02:18/photo/stock/a24-11.html
53 23/Jun/18 02:18/photo/stock/a31-7.html
53 19/Jun/18 13:39/photo/ultimate-photo-shoot/smclint.gif
53 23/Jun/18 02:14/photo/stock/a193-34crop.html
53 23/Jun/18 02:15/photo/stock/a229-24.html
53 0.05%23/Jun/18 17:22/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-P400-5.jpg
53 23/Jun/18 20:34/photo/stock/a121-22.html
53 23/Jun/18 04:43/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
52 0.02%23/Jun/18 15:27/publications/QuantInfComp-8-0622.pdf
52 22/Jun/18 07:38/photo/family-archive/arc-im1-1.jpg
52 22/Jun/18 13:48/photo/family-archive/arc-im2-1fr.jpg
52 22/Jun/18 22:48/photo/stock/a8-31-1.jpg
52 0.01%22/Jun/18 16:09/publications/CLEO_Europe_EQEC_2009-sauge-makarov-anisimov.pdf
52 23/Jun/18 04:43/listfirm/power.html
52 22/Jun/18 09:44/publications/jain2014.CEWQO2014-subm-161.pdf
51 0.49%20/Jun/18 02:45/lab/presentations/Makarov-20170808-SHA2017.pdf
51 0.04%23/Jun/18 17:23/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-1550nm-laser-5.jpg
51 0.02%23/Jun/18 15:53/photo/stock/a210-34-4.jpg
51 0.06%23/Jun/18 17:26/lab/pictures/20140606-3-pallets-to-ship.jpg
51 0.01%23/Jun/18 13:18/publications/qin2017.QCrypt2017-subm134.pdf
51 23/Jun/18 19:42/photo/stock/a104-31-1.jpg
51 0.04%22/Jun/18 11:48/publications/NewJPhys-13-013043.pdf
50 0.01%13/Jun/18 15:26/photo/stock/a50-32-4.jpg
50 0.02%18/Jun/18 16:07/photo/stock/a135-29-4.jpg
50 21/Jun/18 03:48/photo/stock/a104-36-1.jpg
50 0.02%22/Jun/18 14:12/publications/chaiwongkhot2017.QuantumSciTechnol-2-044003.pdf
50 0.13%23/Jun/18 15:58/publications/phd-defence-makarov-20070430.pdf
50 0.47%22/Jun/18 22:01/lab/presentations/IDQ_winter_school_20130122-Loopholes-in-implementations-of-quantum-cryptography.pdf
49 23/Jun/18 04:43/photo/foundview/intro/
49 23/Jun/18 02:21/photo/stock/n89-20.html
49 19/Jun/18 23:41/photo/stock/n13-36-1.jpg
49 23/Jun/18 02:14/photo/stock/a194-29crop.html
49 0.01%19/Jun/18 10:31/photo/stock/n12-31-4.jpg
49 0.04%23/Jun/18 17:22/lab/hacking-commercial-quantum-cryptography-2010/press-release-20100829-NTNU-MPL-FAU-IDQ.pdf
49 0.05%22/Jun/18 16:45/photo/stock/20081114-quantum-hacking-group-5.jpg
49 0.07%23/Jun/18 17:23/lab/pictures/20160518-Garcia-Escartin-in-labQNC3303.jpg
49 23/Jun/18 04:43/photo/foundview/aboutfv/fvusing.html
49 23/Jun/18 02:23/photo/stock/n16-4.html
49 23/Jun/18 02:22/photo/stock/a14-12.html
49 23/Jun/18 01:20/photo/family-archive/sheets/17b-2.jpg
48 0.02%23/Jun/18 08:06/lab/full-eavesdropping-2011/press-release-20110614-NTNU-CQT-UNIK.pdf
48 23/Jun/18 04:43/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
48 22/Jun/18 07:38/photo/family-archive/sheets/13b-2.jpg
48 22/Jun/18 07:28/publications/ApplPhysLett-99-196101.pdf
48 21/Jun/18 02:28/photo/stock/a22-26-1.jpg
48 0.03%19/Jun/18 08:02/lab/publications/xu2015.NatCommun-6-8735.pdf
48 23/Jun/18 04:43/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/conferences.html
48 23/Jun/18 06:12/photo/foundview/intro/guidel.html
48 23/Jun/18 00:06/photo/family-archive/vm-200511-1.jpg
48 23/Jun/18 02:14/photo/stock/a208-15.html
48 0.02%18/Jun/18 13:54/photo/stock/n40-17-4.jpg
47 23/Jun/18 02:58/photo/stock/n14-6-1.jpg
47 0.02%22/Jun/18 09:29/publications/huang2016.QCrypt2016-subm69.pdf
47 23/Jun/18 04:44/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/people.html
47 0.05%21/Jun/18 13:28/manuals/PFOS-OTDR-training-manual.pdf
47 19/Jun/18 23:03/lab/pictures/Tenerife-OGS-tracking-beam-2-2.jpg
47 22/Jun/18 07:38/photo/family-archive/sheets/13-2.jpg
47 22/Jun/18 12:35/photo/family-archive/sheets/2-2.jpg
47 22/Jun/18 07:32/photo/stock/20090226-bob-control-experiment-whole-setup-2.jpg
47 23/Jun/18 04:43/photo/foundview/aboutfv/
47 0.08%22/Jun/18 11:37/publications/lim2017.EPJQuantumTechnol-4-11.pdf
47 0.01%19/Jun/18 13:23/photo/stock/a181-2-4.jpg
47 0.02%21/Jun/18 07:26/lab/press/VG_Fredag-20101105-p26-29.pdf
47 23/Jun/18 01:27/photo/family-archive/sheets/14b-2.jpg
47 22/Jun/18 15:10/photo/family-archive/sheets/1b-2.jpg
47 0.01%21/Jun/18 21:09/photo/stock/a211-25-3.jpg
47 22/Jun/18 09:10/photo/family-archive/sheets/12b-2.jpg
47 0.07%20/Jun/18 22:05/photo/stock/a211-36-5.jpg
47 0.05%23/Jun/18 18:14/lab/pictures/20160118-IDQ-winter-school-group-picture-Glacier-3000.jpg
47 0.01%22/Jun/18 07:22/publications/ApplPhysLett-99-196102.pdf
47 23/Jun/18 06:58/photo/stock/n22-27-3.jpg
47 0.01%23/Jun/18 20:16/photo/stock/a208-36-3.jpg
47 22/Jun/18 18:53/photo/family-archive/sheets/15b-2.jpg
46 0.01%20/Jun/18 06:35/photo/stock/a256-15-3.jpg
46 23/Jun/18 04:43/photo/foundview/aboutfv/fvreal.html
46 22/Jun/18 07:38/photo/family-archive/sheets/7-2.jpg
46 22/Jun/18 20:55/photo/family-archive/sheets/11-2.jpg
46 0.02%23/Jun/18 17:22/lab/hacking-commercial-quantum-cryptography-2010/20100603-hacking-tools-variable-attenuator-5.jpg
46 23/Jun/18 04:44/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
46 22/Jun/18 07:38/photo/family-archive/sheets/10b-2.jpg
46 23/Jun/18 02:17/photo/stock/a139-31.html
46 23/Jun/18 04:44/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/
46 23/Jun/18 04:44/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/people.html
46 0.03%22/Jun/18 16:28/publications/makarov2016.PhysRevA-94-030302-with-supplementary.pdf
46 0.01%23/Jun/18 16:11/photo/stock/n8-23-4.jpg
46 23/Jun/18 00:21/photo/family-archive/sheets/2b-2.jpg
45 23/Jun/18 04:44/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/
45 0.04%23/Jun/18 17:32/lab/pictures/20140503-radiation-testing-detector-group-persp.jpg
45 0.41%23/Jun/18 09:37/lab/presentations/IDQ_winter_school_20110119-Attacks-on-implementations-of-quantum-cryptography.ppt
45 22/Jun/18 15:02/photo/family-archive/sheets/15-2.jpg
45 22/Jun/18 07:38/photo/family-archive/sheets/5b-2.jpg
45 0.07%23/Jun/18 17:25/lab/pictures/20140611-test-plate-back-cables-attached.jpg
45 0.06%22/Jun/18 02:59/photo/stock/a75-21-5.jpg
45 23/Jun/18 04:44/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/
45 0.01%20/Jun/18 06:25/photo/stock/a212-11-3.jpg
45 0.10%21/Jun/18 15:57/photo/stock/20110510-PerkinElmer-SPCM-AQR-13-FC-sn7069-decapsulated-5.jpg
45 19/Jun/18 23:03/lab/pictures/La-Palma-JKT-tracking-beam-2.jpg
45 0.01%22/Jun/18 11:53/publications/pugh2017.ProcCLEO2017-ATu4B.5.pdf
45 22/Jun/18 12:26/photo/family-archive/sheets/6-2.jpg
45 22/Jun/18 15:17/photo/family-archive/sheets/1-2.jpg
45 21/Jun/18 07:21/photo/stock/a214-33-3.jpg
45 0.01%23/Jun/18 18:48/photo/stock/a212-28-3.jpg
44 23/Jun/18 04:13/photo/stock/a285-18-2.jpg
44 0.01%22/Jun/18 19:19/photo/stock/n87-15-4.jpg
44 22/Jun/18 11:37/photo/family-archive/sheets/11b-2.jpg
44 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
44 22/Jun/18 15:47/photo/family-archive/sheets/9b-2.jpg
44 0.01%22/Jun/18 03:09/photo/stock/a209-21-3.jpg
44 22/Jun/18 20:48/photo/family-archive/sheets/7b-2.jpg
44 0.02%22/Jun/18 21:22/photo/stock/a138-29-4.jpg
44 0.10%22/Jun/18 21:12/lab/pictures/20131220-Quantis-sn100732A410-open-5.jpg
44 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
44 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/
44 23/Jun/18 02:04/photo/family-archive/sheets/3b-2.jpg
44 23/Jun/18 02:11/photo/family-archive/sheets/17-2.jpg
44 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
44 22/Jun/18 21:47/icons/blank.gif
44 22/Jun/18 07:38/photo/family-archive/sheets/8-2.jpg
44 23/Jun/18 04:44/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/other.html
44 0.16%22/Jun/18 10:13/publications/sajeed2016.QCrypt2016-subm52.pdf
44 22/Jun/18 21:47/icons/back.gif
44 0.03%23/Jun/18 02:32/publications/anisimova2015.QCrypt2015-subm86.pdf
44 22/Jun/18 16:31/photo/family-archive/sheets/6b-2.jpg
44 0.08%22/Jun/18 14:00/photo/stock/a292-20-5.jpg
44 21/Jun/18 07:21/photo/stock/a210-25-3.jpg
44 23/Jun/18 01:49/photo/family-archive/sheets/4b-2.jpg
44 0.01%23/Jun/18 16:38/photo/n17-26-3-15bit.jpg
43 0.01%23/Jun/18 17:14/photo/stock/a210-16-3.jpg
43 0.15%20/Jun/18 23:41/photo/stock/a251-19-5.jpg
43 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
43 22/Jun/18 19:42/photo/stock/a82-8-3.jpg
43 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
43 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
43 23/Jun/18 04:57/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/presentations/
43 0.02%21/Jun/18 18:57/photo/stock/200807-id3110-alice_sn08008F030-bob_sn08008F130-4.jpg
43 0.01%22/Jun/18 03:20/photo/stock/20090705-eavesdropping-experiment-on-nus-campus-map-3s.jpg
43 23/Jun/18 00:36/photo/family-archive/sheets/10-2.jpg
43 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/press/publications.html
43 22/Jun/18 07:38/photo/family-archive/vm-20061224-19-1.jpg
43 21/Jun/18 21:12/photo/stock/n9-24-3.jpg
43 0.06%19/Jun/18 05:31/photo/family-archive/20121212-Makarov-5.jpg
43 22/Jun/18 07:38/photo/family-archive/sheets/8b-2.jpg
43 19/Jun/18 23:03/lab/publications/makarov2016.PhysRevA-94-030302-fig2b-after-1.jpg
43 22/Jun/18 14:18/photo/family-archive/sheets/14-2.jpg
43 19/Jun/18 23:41/photo/stock/a105-12-1.jpg
43 0.02%17/Apr/18 21:50/adhoc/20180409gvhgvrghfg/Makarov-brief.pdf
43 22/Jun/18 13:40/photo/family-archive/sheets/16-2.jpg
43 21/Jun/18 04:42/photo/stock/n67-3-1.jpg
43 22/Jun/18 07:38/photo/family-archive/vm-20061224-16-1.jpg
43 23/Jun/18 14:59/photo/stock/a215-12-3.jpg
43 22/Jun/18 11:45/photo/family-archive/sheets/5-2.jpg
42 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/
42 23/Jun/18 04:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
42 22/Jun/18 07:38/photo/family-archive/sheets/9-2.jpg
42 23/Jun/18 04:49/photo/foundview/aboutfv/fvnotes.html
42 0.03%22/Jun/18 12:41/publications/chaiwongkhot2016.QCrypt2016-subm79.pdf
42 0.01%23/Jun/18 07:20/photo/stock/a215-6-3.jpg
42 23/Jun/18 03:52/photo/stock/a211-21-3.jpg
42 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
42 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/publications.html
42 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/
42 22/Jun/18 07:38/photo/family-archive/sheets/4-2.jpg
42 22/Jun/18 10:56/photo/family-archive/sheets/16b-2.jpg
42 23/Jun/18 04:49/photo/foundview/intro/howworks.html
42 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
42 20/Jun/18 00:04/photo/stock/a256-29-2s.jpg
42 22/Jun/18 07:38/photo/family-archive/sheets/12-2.jpg
42 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
42 22/Jun/18 20:29/photo/stock/a253-8-1.jpg
42 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
42 23/Jun/18 04:50/photo/foundview/finalfv/fvpub.html
42 23/Jun/18 04:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/
42 23/Jun/18 01:56/photo/family-archive/sheets/3-2.jpg
42 0.02%22/Jun/18 04:40/photo/stock/a75-21-4.jpg
42 22/Jun/18 07:09/photo/family-archive/arc-im1-1s.jpg
42 0.01%19/Jun/18 11:47/photo/stock/n65-35flare-4.jpg
42 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
41 21/Jun/18 07:21/photo/stock/a214-26-3.jpg
41 23/Jun/18 04:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
41 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/
41 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/
41 0.05%23/Jun/18 02:45/publications/paper-filippov-1999.pdf
41 0.12%23/Jun/18 19:43/lab/pictures/20140611-cyclotron-hall.jpg
41 0.01%22/Jun/18 07:09/photo/family-archive/vm-200511-4.jpg
41 0.08%23/Jun/18 03:50/photo/stock/a285-23-5.jpg
41 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/people.html
41 23/Jun/18 04:49/lab/pictures.html/presentations/press/presentations/presentations/
41 19/Jun/18 23:41/photo/stock/a105-6-1.jpg
41 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
41 19/Jun/18 23:41/photo/stock/a92-17-1.jpg
41 23/Jun/18 20:27/photo/stock/a291-18-2.jpg
41 0.05%20/Jun/18 07:56/lab/publications/OptExpress-18-27938.pdf
41 0.07%18/Jun/18 18:22/photo/stock/n9-24-5.jpg
41 0.01%17/Apr/18 21:50/adhoc/20180409gvhgvrghfg/Makarov-CV-20180326.pdf
41 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
41 0.01%23/Jun/18 18:32/photo/stock/a285-23-4.jpg
41 23/Jun/18 04:58/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/
41 0.01%22/Jun/18 10:06/publications/sajeed2017.QCrypt2017-subm61.pdf
41 0.01%20/Jun/18 18:39/photo/stock/n20-1orig-4.jpg
41 0.02%23/Jun/18 04:01/photo/stock/20090705-eavesdropping-experiment-on-nus-campus-map-4.jpg
41 0.01%18/Jun/18 08:22/photo/stock/a215-19-3.jpg
41 0.09%23/Jun/18 00:35/photo/stock/a146-24-5.jpg
41 23/Jun/18 04:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/publications.html
40 0.09%19/Jun/18 18:57/lab/pictures/20141218-lab-QNC3301-construction-Pinheiro-cutting.jpg
40 23/Jun/18 04:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
40 17/Jun/18 16:06/graphics/fl-ru-h15.gif
40 23/Jun/18 04:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
40 23/Jun/18 04:53/photo/foundview/aboutfv/fvhist.html
40 0.01%22/Jun/18 20:27/photo/stock/pm-open-300dpi.jpg
40 0.02%22/Jun/18 07:43/photo/stock/n99-18-4.jpg
40 23/Jun/18 04:55/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
40 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
40 23/Jun/18 05:04/lab/pictures.html/press/press/
40 23/Jun/18 04:57/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
40 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/presentations/press/
40 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/presentations/press/publications.html
40 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/people.html
40 23/Jun/18 04:49/lab/pictures.html/presentations/press/presentations/presentations/people.html
40 0.04%20/Jun/18 19:31/lab/pictures/20160118-IDQ-winter-school-group-picture-Peak-walk.jpg
40 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
40 0.01%21/Jun/18 07:21/photo/stock/a214-5-3.jpg
40 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/presentations/people.html
40 0.01%21/Jun/18 07:21/photo/stock/a213-34-3.jpg
40 23/Jun/18 04:58/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
40 0.08%19/Jun/18 07:58/photo/stock/a43-36-5.jpg
40 23/Jun/18 04:59/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
40 23/Jun/18 04:59/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
40 23/Jun/18 05:16/lab/pictures.html/press/press/presentations/
39 23/Jun/18 04:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/
39 23/Jun/18 04:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
39 23/Jun/18 04:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/publications.html
39 21/Jun/18 07:21/photo/stock/a213-29-3.jpg
39 21/Jun/18 07:21/photo/stock/a212-23-3.jpg
39 23/Jun/18 04:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/
39 0.01%14/Jun/18 08:39/photo/stock/a210-18-3.jpg
39 23/Jun/18 04:54/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/
39 23/Jun/18 04:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
39 23/Jun/18 04:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
39 23/Jun/18 04:55/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/
39 0.01%23/Jun/18 03:24/publications/huang2017.QCrypt2017-subm80.pdf
39 23/Jun/18 04:55/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/presentations/people.html
39 23/Jun/18 04:55/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/presentations/other.html
39 23/Jun/18 04:55/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
39 0.11%22/Jun/18 19:18/lab/pictures/20140612-Higgins-Bourgoin-discussing-post-irradiation-test.jpg
39 23/Jun/18 04:55/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/people.html
39 23/Jun/18 04:55/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
39 23/Jun/18 04:55/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
39 23/Jun/18 04:55/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/
39 23/Jun/18 05:02/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
39 23/Jun/18 05:02/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
39 21/Jun/18 23:47/photo/stock/20110510-PerkinElmer-SPCM-AQR-13-FC-sn7069-decapsulated-3.jpg
39 23/Jun/18 02:28/photo/stock/a8-31-3.jpg
39 20/Jun/18 00:05/photo/stock/a287-6-2.jpg
39 23/Jun/18 04:57/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
39 23/Jun/18 22:48/photo/stock/n87-15-3.jpg
39 19/Jun/18 10:40/photo/stock/a100-17-3.jpg
39 23/Jun/18 04:57/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
39 23/Jun/18 04:58/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/
39 20/Jun/18 22:32/photo/stock/a285-23-2.jpg
39 23/Jun/18 04:58/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/press/other.html
39 23/Jun/18 04:58/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/people.html
39 23/Jun/18 05:03/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/press/conferences.html
39 23/Jun/18 05:06/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/
39 23/Jun/18 04:58/photo/foundview/intro/seven.html
39 23/Jun/18 05:03/photo/foundview/intro/eight.html
39 23/Jun/18 04:59/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
39 23/Jun/18 05:03/lab/pictures.html/press/
39 23/Jun/18 04:59/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
39 23/Jun/18 05:03/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/presentations/
39 23/Jun/18 04:59/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/presentations/
39 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/
39 23/Jun/18 04:59/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
39 23/Jun/18 04:59/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/
39 23/Jun/18 05:00/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/
39 23/Jun/18 05:00/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/other.html
39 20/Jun/18 00:04/photo/stock/a256-21-2s.jpg
39 23/Jun/18 05:00/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
38 23/Jun/18 05:00/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
38 23/Jun/18 05:00/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/conferences.html
38 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
38 23/Jun/18 05:04/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/other.html
38 23/Jun/18 04:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/
38 21/Jun/18 16:06/photo/folldal/favicon.ico
38 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
38 23/Jun/18 05:00/lab/pictures.html/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
38 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/presentations/press/conferences.html
38 0.02%21/Jun/18 02:54/photo/family-archive/20121212-Makarov-4.jpg
38 23/Jun/18 05:01/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
38 23/Jun/18 05:01/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/
38 0.01%17/Jun/18 10:51/photo/stock/a211-4-4.jpg
38 23/Jun/18 05:01/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
38 23/Jun/18 05:09/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
38 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/
38 23/Jun/18 05:02/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/other.html
38 0.01%19/Jun/18 06:28/photo/stock/a213-15-3.jpg
38 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
38 21/Jun/18 07:21/photo/stock/a212-20-3.jpg
38 0.02%22/Jun/18 20:28/lab/alexey/diploma.doc
38 20/Jun/18 02:11/photo/stock/n58-33-1.jpg
38 23/Jun/18 05:05/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
38 23/Jun/18 04:57/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/other.html
38 22/Jun/18 17:07/photo/stock/a89-7-3.jpg
38 23/Jun/18 05:02/lab/pictures.html/press/people.html
38 23/Jun/18 05:05/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
38 23/Jun/18 05:02/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
38 23/Jun/18 05:02/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/
38 23/Jun/18 05:02/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/
38 23/Jun/18 05:05/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
38 0.03%22/Jun/18 06:52/publications/sajeed2014.QCrypt2014.pdf
38 19/Jun/18 23:41/photo/stock/n27-17-1.jpg
38 20/Jun/18 00:04/photo/stock/20090106-suitcase-painting-2.jpg
38 21/Jun/18 07:21/photo/stock/a213-10-3.jpg
38 23/Jun/18 05:05/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
38 23/Jun/18 05:03/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/
38 23/Jun/18 05:05/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/presentations/press/other.html
38 23/Jun/18 05:11/photo/foundview/finalfv/fvfinalw.html
38 23/Jun/18 05:03/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/other.html
38 23/Jun/18 05:06/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/
38 23/Jun/18 05:06/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/
38 23/Jun/18 05:06/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
38 23/Jun/18 05:03/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/
38 23/Jun/18 05:03/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/
38 0.01%22/Jun/18 10:21/publications/anisimova2015.SPW2015-subm106.pdf
38 23/Jun/18 05:06/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/other.html
38 23/Jun/18 05:03/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/
38 0.10%23/Jun/18 06:02/photo/stock/20100615-TropicalQKD-Waterloo-conference-group-picture-5uncropped.jpg
38 23/Jun/18 05:06/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/
38 23/Jun/18 05:07/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/
38 23/Jun/18 04:59/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/
38 23/Jun/18 05:07/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/publications.html
38 0.04%23/Jun/18 17:24/lab/pictures/20140613-Makarov-coins-on-top-of-cyclotron.jpg
38 23/Jun/18 05:07/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
38 23/Jun/18 05:07/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/press/
38 23/Jun/18 05:07/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
38 23/Jun/18 05:07/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
38 23/Jun/18 05:08/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/
38 23/Jun/18 04:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
38 0.30% 4/Jun/18 22:15/lab/presentations/Makarov-Huang-20151102-seminars-in-Korea-China-superset.pdf
37 0.01%22/Jun/18 09:21/publications/huang2015.QCrypt2015-subm39.pdf
37 23/Jun/18 05:13/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/
37 0.05%23/Jun/18 02:03/photo/stock/n17-31-5.jpg
37 23/Jun/18 17:41/photo/stock/a103-18-3.jpg
37 21/Jun/18 00:15/photo/filmform1.gif
37 0.06%23/Jun/18 17:42/lab/pictures/20140503-radiation-testing-detector-group-front.jpg
37 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
37 23/Jun/18 05:08/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
37 19/Jun/18 23:41/photo/stock/n38-3-1.jpg
37 23/Jun/18 04:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
37 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/
37 0.02%19/Jun/18 12:54/photo/stock/a43-12-4.jpg
37 23/Jun/18 05:00/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
37 23/Jun/18 05:08/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
37 23/Jun/18 05:08/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
37 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/
37 21/Jun/18 22:32/photo/stock/n46-28-1.jpg
37 19/Jun/18 23:41/photo/stock/n20-34-1.jpg
37 23/Jun/18 05:09/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/presentations/presentations/other.html
37 19/Jun/18 23:41/photo/stock/n9-29-1.jpg
37 23/Jun/18 05:05/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/
37 22/Jun/18 23:15/photo/foundview/art/fvlogo.gif
37 0.01%23/Jun/18 15:16/publications/anisimova2015.QCrypt2015-subm91.pdf
37 0.01%22/Jun/18 20:27/photo/stock/a105-12-4.jpg
37 23/Jun/18 05:05/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/
37 23/Jun/18 05:10/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/
37 0.01%20/Jun/18 23:12/photo/stock/a66-30comp-3.jpg
37 23/Jun/18 05:10/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
37 23/Jun/18 05:15/photo/foundview/finalfv/fvipol.html
37 21/Jun/18 20:44/photo/stock/a213-32-3.jpg
37 23/Jun/18 05:11/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
37 23/Jun/18 05:11/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/
37 17/Jun/18 18:23/photo/stock/a215-3-3.jpg
37 23/Jun/18 05:06/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/press/other.html
37 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/other.html
37 23/Jun/18 05:11/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/hacking-commercial-quantum-cryptography-2010/conferences.html
37 23/Jun/18 05:12/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
37 0.11%22/Jun/18 09:59/publications/phd-defence-makarov-20070430.ppt
37 23/Jun/18 05:16/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/
37 23/Jun/18 05:12/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
37 23/Jun/18 05:12/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/publications.html
37 23/Jun/18 05:12/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/full-eavesdropping-2011/conferences.html
37 23/Jun/18 05:12/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
37 23/Jun/18 05:08/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/other.html
37 23/Jun/18 05:12/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
37 23/Jun/18 05:04/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/press/
36 23/Jun/18 05:12/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/
36 23/Jun/18 05:16/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
36 21/Jun/18 19:43/photo/stock/n8-6-3.jpg
36 23/Jun/18 05:13/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
36 23/Jun/18 05:13/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/conferences.html
36 21/Jun/18 16:06/photo/folldal/norway-with-folldal-map-ru-1.jpg
36 23/Jun/18 05:13/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/
36 23/Jun/18 05:08/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/
36 23/Jun/18 05:14/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
36 23/Jun/18 05:14/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
36 0.06%23/Jun/18 17:33/lab/pictures/20140503-radiation-testing-detector-group-back.jpg
36 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/presentations/full-eavesdropping-2011/people.html
36 21/Jun/18 23:13/photo/stock/a295-5-2.jpg
36 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
36 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
36 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/
36 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/
36 23/Jun/18 05:15/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
36 23/Jun/18 05:09/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/other.html
36 0.01%23/Jun/18 10:31/photo/stock/a251-28-4.jpg
36 23/Jun/18 05:20/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
36 23/Jun/18 05:10/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/
36 23/Jun/18 13:30/photo/stock/a24-26-1.jpg
36 23/Jun/18 05:10/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/people.html
36 23/Jun/18 05:15/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
36 23/Jun/18 05:21/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/
36 23/Jun/18 05:21/lab/pictures.html/press/full-eavesdropping-2011/press/
36 23/Jun/18 05:11/lab/pictures.html/presentations/press/other.html
36 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
36 0.01%22/Jun/18 07:12/photo/stock/n54-17-4.jpg
36 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
36 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
36 23/Jun/18 23:48/listfirm/photline-crypto-quantique.jpg
36 23/Jun/18 05:11/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/
36 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/
36 23/Jun/18 05:16/lab/pictures.html/presentations/press/presentations/
36 23/Jun/18 05:12/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/
36 23/Jun/18 05:06/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/people.html
36 23/Jun/18 05:16/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
36 23/Jun/18 05:16/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/
36 0.12%16/Jun/18 09:55/lab/presentations/Makarov-20141007-ETSI-quantum-safe-crypto-workshop-Ottawa.pdf
36 23/Jun/18 05:16/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/publications.html
36 23/Jun/18 05:16/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
35 23/Jun/18 05:13/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/
35 23/Jun/18 05:13/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/presentations/
35 23/Jun/18 05:13/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/conferences.html
35 23/Jun/18 05:18/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/other.html
35 23/Jun/18 05:18/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
35 23/Jun/18 05:13/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/
35 23/Jun/18 05:18/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/conferences.html
35 0.14%21/Jun/18 13:53/manuals/PFOS-OTDR-reference-manual.pdf
35 0.01%22/Jun/18 19:54/photo/stock/n97-37-4.jpg
35 23/Jun/18 05:18/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
35 0.01%21/Jun/18 19:23/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-05-3.jpg
35 22/Jun/18 06:24/photo/p300man-26-4.gif
35 0.01%17/Jun/18 15:49/photo/stock/n39-35-4.jpg
35 23/Jun/18 05:19/lab/pictures.html/presentations/press/presentations/other.html
35 0.02%15/Jun/18 16:30/photo/stock/a134-7-4.jpg
35 23/Jun/18 05:19/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
35 23/Jun/18 05:19/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
35 23/Jun/18 05:19/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/press/
35 0.01%20/Jun/18 08:19/photo/stock/a106-3-4.jpg
35 23/Jun/18 05:19/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/press/people.html
35 23/Jun/18 05:20/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/conferences.html
35 23/Jun/18 05:20/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/publications.html
35 23/Jun/18 05:20/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
35 23/Jun/18 05:20/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
35 23/Jun/18 13:13/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
35 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/other.html
35 23/Jun/18 05:20/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
35 23/Jun/18 05:20/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/publications.html
35 23/Jun/18 05:21/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/
35 23/Jun/18 05:10/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/
35 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
35 23/Jun/18 05:21/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/press/presentations/other.html
35 23/Jun/18 23:59/photo/stock/n27-17-3.jpg
35 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/other.html
35 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
35 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/publications.html
35 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/
35 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
35 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/people.html
35 23/Jun/18 05:15/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
35 23/Jun/18 05:16/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/
35 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/
35 0.07%22/Jun/18 11:45/publications/sajeed2016.TyQI.pdf
35 23/Jun/18 05:06/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
35 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/
35 0.31%21/Jun/18 07:04/lab/presentations/Makarov-Cracking_quantum_cryptography-CLEO_Munich_20110526.ppt
35 23/Jun/18 05:24/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
35 23/Jun/18 05:24/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/press/other.html
35 23/Jun/18 05:24/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/
35 23/Jun/18 05:24/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/presentations/
35 23/Jun/18 05:24/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/
34 23/Jun/18 05:24/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
34 23/Jun/18 05:16/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/
34 0.01%23/Jun/18 02:42/publications/jain2017.CEWQO2017-subm31.pdf
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/other.html
34 23/Jun/18 05:16/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/
34 23/Jun/18 05:24/lab/pictures.html/
34 23/Jun/18 05:24/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/press/
34 22/Jun/18 23:25/photo/stock/a7-7-1.jpg
34 23/Jun/18 05:24/lab/pictures.html/presentations/press/presentations/publications.html
34 23/Jun/18 05:24/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
34 0.01%19/Jun/18 04:06/lab/chizhov-2004/diploma-chizhov-2004-hardware-scheme.vsd
34 23/Jun/18 05:18/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/
34 23/Jun/18 05:18/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/presentations/conferences.html
34 23/Jun/18 05:25/lab/pictures.html/press/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/
34 23/Jun/18 13:29/photo/stock/pm-open-75dpi.jpg
34 0.27%19/Jun/18 07:34/lab/presentations/QCRYPT-20110915-Loopholes-in-implementations-of-quantum-cryptography.ppt
34 23/Jun/18 05:25/lab/pictures.html/press/press/presentations/presentations/full-eavesdropping-2011/presentations/press/
34 23/Jun/18 05:19/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
34 23/Jun/18 05:19/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
34 23/Jun/18 05:25/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/publications.html
34 0.01%22/Jun/18 20:13/photo/foundview/dload/fv.txt
34 23/Jun/18 05:25/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
34 0.01%19/Jun/18 02:46/korean-blog/pohang-concert-hall-and-vegetable-gardens.jpg
34 20/Jun/18 11:07/photo/stock/a177-1-1s.jpg
34 23/Jun/18 05:25/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
34 23/Jun/18 05:19/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
34 23/Jun/18 05:25/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
34 19/Jun/18 12:14/photo/stock/n100-30-3.jpg
34 23/Jun/18 05:25/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/press/publications.html
34 23/Jun/18 05:27/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/people.html
34 23/Jun/18 05:27/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/presentations/other.html
34 0.05%19/Jun/18 07:12/photo/stock/20100630-spy-suitcase-for_Gemini_magazine-5.jpg
34 23/Jun/18 05:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/publications.html
34 23/Jun/18 05:28/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
34 23/Jun/18 05:20/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
34 23/Jun/18 05:20/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
34 23/Jun/18 05:20/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
34 0.25%17/Jun/18 06:49/publications/makarov-presentation-attacks-exploiting-component-imperfections-200810.ppt
34 23/Jun/18 05:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/conferences.html
34 23/Jun/18 05:21/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/other.html
34 0.03%20/Jun/18 05:30/misc/20160403-WinMerge-example-of-poor-diff.jpg
34 23/Jun/18 05:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
34 23/Jun/18 05:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/
34 23/Jun/18 05:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/
34 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
34 22/Jun/18 08:35/publications/CLEO_Europe_EQEC_2011-Jain.pdf
34 23/Jun/18 05:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/presentations/people.html
34 22/Jun/18 07:34/photo/family-archive/20121212-Makarov-3.jpg
34 23/Jun/18 05:28/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
34 23/Jun/18 05:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/people.html
34 23/Jun/18 05:28/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
34 23/Jun/18 21:29/photo/stock/a14-6-1.jpg
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
34 19/Jun/18 23:41/photo/stock/n56-25-1.jpg
34 21/Jun/18 23:59/dvd-buying-experience-statchart-vs-price.gif
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/
34 23/Jun/18 05:29/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/publications.html
34 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/
34 0.01%23/Jun/18 04:52/photo/stock/n61-26-4.jpg
34 23/Jun/18 05:23/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/other.html
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
34 0.01%22/Jun/18 19:13/photo/stock/201203-Makarov-2-4.jpg
34 23/Jun/18 05:24/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/presentations/press/other.html
34 23/Jun/18 05:29/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
33 23/Jun/18 07:46/photo/stock/a208-31-3.jpg
33 23/Jun/18 05:29/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/
33 23/Jun/18 05:32/lab/pictures.html/press/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
33 23/Jun/18 05:13/photo/foundview/intro/basics.html
33 0.03%22/Jun/18 08:58/publications/jain2013.QCrypt2013-poster.pdf
33 19/Jun/18 23:41/photo/stock/n54-17-1.jpg
33 23/Jun/18 05:32/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/publications.html
33 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/publications.html
33 23/Jun/18 21:29/photo/stock/n11-33-1.jpg
33 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/
33 23/Jun/18 05:24/lab/pictures.html/press/press/presentations/presentations/full-eavesdropping-2011/
33 23/Jun/18 05:25/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/
33 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/publications.html
33 23/Jun/18 17:55/photo/stock/n20-34-3.jpg
33 23/Jun/18 05:32/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/
33 21/Jun/18 04:41/photo/stock/a146-24-2.jpg
33 0.01%17/Jun/18 23:51/lab/pictures/Anqi-Huang.jpg
33 23/Jun/18 05:32/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/
33 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/people.html
33 23/Jun/18 05:32/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/press/
33 23/Jun/18 05:27/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/
33 23/Jun/18 05:27/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
33 20/Jun/18 00:05/photo/stock/a286-36-2.jpg
33 23/Jun/18 05:32/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/
33 0.08%23/Jun/18 00:19/photo/stock/pm-open-1200dpi.jpg
33 23/Jun/18 05:32/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/
33 0.01%19/Jun/18 23:42/photo/stock/quantum-hacking-group-groenlia20080923-3.jpg
33 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/
33 0.06%23/Jun/18 17:32/lab/hacking-commercial-quantum-cryptography-2010/FAZ-20100908-Cunning_attack_on_quantum_key.pdf
33 0.03%23/Jun/18 17:25/lab/hacking-commercial-quantum-cryptography-2010/radiorevolt_no-Uillustrert-vitenskap-20100916-Studenter-ved-NTNU-knakk-kvantekrypteringssystem.mp3
33 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/press/
33 23/Jun/18 05:32/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/people.html
33 21/Jun/18 07:21/photo/stock/a211-4-3.jpg
33 23/Jun/18 05:32/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
33 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/publications.html
33 23/Jun/18 23:42/photo/stock/a138-29-3.jpg
33 23/Jun/18 05:33/lab/pictures.html/press/full-eavesdropping-2011/presentations/publications.html
33 23/Jun/18 05:33/lab/pictures.html/press/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/people.html
33 0.01%22/Jun/18 21:55/photo/dirty-scanner/ls4000-ghosts.jpg
33 23/Jun/18 05:32/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
33 23/Jun/18 08:22/spam-bell-20041231.jpg
33 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/people.html
32 0.06%22/Jun/18 23:49/lab/pictures/20160630-group-photo-at-the-Bund-Shanghai.jpg
32 0.01%23/Jun/18 23:44/photo/stock/a191-9-4.jpg
32 19/Jun/18 23:41/photo/stock/a14-3-1.jpg
32 23/Jun/18 05:33/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
32 23/Jun/18 05:34/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
32 0.10%23/Jun/18 17:30/lab/pictures/20140612-Higgins-starting-irradiation-test.jpg
32 22/Jun/18 10:05http://www.vad1.com/
32 0.07%23/Jun/18 17:43/lab/pictures/20141126-Wei-Xu-in-quantum-hacking-lab.jpg
32 23/Jun/18 05:34/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/
32 0.01%20/Jun/18 03:25/photo/stock/a43-36-4.jpg
32 0.02%22/Jun/18 12:13/publications/pinheiro2015.QCrypt2015-subm169.pdf
32 19/Jun/18 23:41/photo/stock/n11-15-1.jpg
32 0.05%23/Jun/18 14:53/lab/press/meese-tamuri2013.Reach-1-8.pdf
32 23/Jun/18 05:33/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
32 23/Jun/18 16:27/lab/pictures/20130523-QHlab-Kaiser-Bennett-Davidovich-1s.jpg
32 0.02%18/Jun/18 01:59/photo/stock/a251-19-4.jpg
32 22/Jun/18 10:35/publications/sajeed2017.ICNFP2017-subm1089.pdf
32 21/Jun/18 23:54/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-11-1s.jpg
32 23/Jun/18 05:34/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/
32 20/Jun/18 21:58/photo/stock/n12-29-3.jpg
32 20/Jun/18 13:51/photo/stock/a84-30-3.jpg
32 20/Jun/18 00:05/photo/stock/a292-32-2.jpg
32 0.06%18/Jun/18 01:23/lab/pictures/elena-anisimova.jpg
32 23/Jun/18 16:40/publications/sajeed2017.ICNFP2017-subm1046.pdf
32 0.07%23/Jun/18 20:35/photo/stock/a11-5-5.jpg
31 19/Jun/18 23:41/photo/stock/n72-24-1.jpg
31 23/Jun/18 22:08/photo/stock/a6-7-1.jpg
31 0.02%23/Jun/18 05:44/photo/stock/a66-30comp-4.jpg
31 23/Jun/18 07:16/photo/stock/a209-6-3.jpg
31 0.06%17/Jun/18 17:31/lab/pictures/20160812-Lim-shows-APD-testing-setup-labQNC3301-3.jpg
31 23/Jun/18 09:25/photo/stock/a11-29-1.jpg
31 0.01%22/Jun/18 21:29/photo/stock/n37-15-4.jpg
31 23/Jun/18 05:33/bogusreferer.html
31 0.32% 8/Jun/18 17:19/lab/presentations/Makarov-Quantum-hacking-USEQIP_20120607.ppt
31 23/Jun/18 20:51/photo/stock/a100-24-3.jpg
31 19/Jun/18 23:41/photo/stock/n46-8-1.jpg
31 21/Jun/18 04:41/photo/stock/a131-22-1.jpg
31 21/Jun/18 03:46/photo/stock/n89-16-1.jpg
31 0.04%22/Jun/18 11:18/photo/stock/n22-2-5.jpg
31 21/Jun/18 15:06/carry_tr.gif
31 23/Jun/18 17:18/photo/stock/n90-33-4.jpg
31 23/Jun/18 05:36/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/other.html
31 22/Jun/18 17:20/publications/pugh2017.multiple-confs-COST-QT-Malta-CAP-congress-Kingston-CLEO-Europe-Munich-CAM-grad-conf-Washington.pdf
31 0.01%18/Jun/18 18:23/photo/stock/a104-31-3.jpg
31 0.09%23/Jun/18 17:39/lab/pictures/20140611-Anisimova-Bourgoin-assembling-test-plate.jpg
31 20/Jun/18 00:05/photo/stock/a294-4-2.jpg
31 19/Jun/18 23:41/photo/stock/n42-28-1.jpg
31 19/Jun/18 23:41/photo/stock/n12-31-1.jpg
31 23/Jun/18 07:49/lab/kirill/aterpulse-bl-idea.gif
31 23/Jun/18 05:36/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/
31 0.03%21/Jun/18 04:34/lab/pictures/Olivia-De-Matteo.jpg
31 17/Jun/18 23:04/lab/pictures/Tenerife-OGS-tracking-beam-1s.jpg
31 0.07%20/Jun/18 23:56/photo/stock/n37-32-5.jpg
31 0.02%18/Jun/18 12:00/photo/stock/a230-5-4.jpg
30 0.01%20/Jun/18 19:28/photo/phd-defence-20070430/makarov-phd-defence-20070430-10-5.jpg
30 23/Jun/18 05:34/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/press/
30 0.02%20/Jun/18 07:38/lab/pictures/20140613-team-in-control-room.jpg
30 21/Jun/18 06:44/photo/filmform3.gif
30 0.07%23/Jun/18 17:34/lab/pictures/20140611-test-plate-front.jpg
30 20/Jun/18 04:17/photo/p300-support-plate-3.gif
30 23/Jun/18 05:34/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
30 21/Jun/18 07:26/photo/stock/n37-27-1.jpg
30 21/Jun/18 20:32/photo/stock/a141-36-1.jpg
30 18/Jun/18 06:49/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-10-1s.jpg
30 0.06%23/Jun/18 17:29/lab/pictures/20160313-Daria-in-labQNC3303.jpg
30 23/Jun/18 19:02/photo/stock/a84-30-2.jpg
30 23/Jun/18 05:36/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
30 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/
30 20/Jun/18 20:41/photo/stock/a99-12-1.jpg
30 23/Jun/18 07:23/photo/stock/a89-7-1.jpg
30 18/Jun/18 11:42/photo/stock/n20-1orig-1s.jpg
30  6/Jun/18 22:16/photo/stock/n65-35flare-3.jpg
30 23/Jun/18 05:36/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/presentations/press/conferences.html
30 0.01%20/Jun/18 06:46/lab/alexey/diploma.pdf
30 22/Jun/18 16:16/photo/phd-defence-20070430/makarov-phd-defence-20070430-10-2.jpg
30 19/Jun/18 23:41/photo/stock/a14-30-1.jpg
30 20/Jun/18 19:04/photo/filmform2.gif
30 22/Jun/18 08:34/photo/stock/a181-12-2s-numbers.jpg
30 0.02%23/Jun/18 02:58/lab/publications/xu2015.Qcrypt2015-subm3.pdf
30 21/Jun/18 02:14/photo/ultimate-photo-shoot/clinton.gif
30 0.11%17/Jun/18 19:05/lab/pictures/20140612-radiation-warning-label.jpg
30 23/Jun/18 05:37/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/full-eavesdropping-2011/
30 0.06%23/Jun/18 09:55/lab/poster-minsk-200605/presentation-minsk-200605.pdf
30 19/Jun/18 14:17/photo/stock/n10-8-3.jpg
30 0.02%20/Jun/18 07:05/photo/stock/a225-36-4.jpg
30 0.06%22/Jun/18 09:54/photo/stock/a146-33-5.jpg
30 0.01%22/Jun/18 04:38/photo/stock/a177-1-4.jpg
30 21/Jun/18 20:42/photo/p300man-27-4.gif
30 0.07%22/Jun/18 14:57/photo/stock/a215-19-5.jpg
30 16/Jun/18 02:17/photo/stock/a230-5-2.jpg
30 0.01%23/Jun/18 07:04/photo/stock/20110510-PerkinElmer-SPCM-AQR-13-FC-sn7069-decapsulated-4.jpg
29 20/Jun/18 21:56/photo/stock/a7-24-1.jpg
29 21/Jun/18 19:14/photo/stock/n25-13-1.jpg
29 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
29 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/
29 0.01%23/Jun/18 15:10/photo/stock/n27-17-4.jpg
29 23/Jun/18 15:22/photo/stock/n7-18-3.jpg
29 21/Jun/18 08:22/lab/torbjoern/abstract.pdf
29 0.08%18/Jun/18 19:15/photo/stock/a290-32-5.jpg
29 19/Jun/18 23:41/photo/stock/a92-20-1.jpg
29 17/Jun/18 09:42/photo/stock/a292-20-2.jpg
29 0.03%22/Jun/18 06:10/publications/paper-filippov-1999a.pdf
29 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/
29 23/Jun/18 05:36/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
29 23/Jun/18 19:42/photo/stock/n28-36-1.jpg
29 0.01%13/Jun/18 18:08/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-11-3.jpg
29 19/Jun/18 22:03/lab/kirill/aterpulse-bl-hardware.gif
29 15/Jun/18 23:49/photo/stock/a25-8-3.jpg
29 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/presentations/
29 0.01%22/Jun/18 21:55/photo/phd-defence-20070430/makarov-phd-defence-20070430-04-5.jpg
29 23/Jun/18 01:36/photo/p300man-25-4.gif
29 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
29 19/Jun/18 05:05/lab/pictures/Mayank-Mishra-20120519-1s.jpg
29 0.11%19/Jun/18 05:04/lab/pictures/20140614-Jennewein-Anisimova-Makarov-in-Horseshoe-Bay-British-Columbia-Canada.jpg
29 18/Jun/18 07:31/photo/stock/a204-3-3.jpg
29 0.03%23/Jun/18 11:07/photo/stock/brygga-panorama-5.jpg
29 22/Jun/18 20:26/photo/stock/a128-1comp-2.jpg
28 0.01%31/May/18 21:55/lab/press/UWaterloo-magazine-2013fall-p35.pdf
28 0.07%18/Jun/18 01:01/photo/stock/20110919-Lydersen-defence-group-photo-5.jpg
28 19/Jun/18 14:18/photo/stock/n55-23-3.jpg
28 22/Jun/18 11:49/lab/bestposter-flaam2002-3.jpg
28 19/Jun/18 23:41/photo/stock/a27-20-1.jpg
28 19/Jun/18 23:41/photo/stock/a134-18-1.jpg
28 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/
28 2.95%15/Jun/18 02:17/lab/presentations/20110915_0900_CABG61_QCRYPT_Makarov-dm.m4v
28 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/presentations/
28 23/Jun/18 05:38/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/
28 20/Jun/18 21:53/photo/stock/a99-12-3.jpg
28 22/Jun/18 20:52/photo/stock/201203-Makarov-2-3.jpg
28 23/Jun/18 05:38/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
28 23/Jun/18 22:06/photo/stock/n8-23-3.jpg
28 19/Jun/18 23:41/photo/stock/a100-17-1.jpg
28 23/Jun/18 05:38/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/
28 15/Jun/18 20:25/photo/stock/a98-3-3.jpg
28 19/Jun/18 23:41/photo/stock/n8-32q-1.jpg
28 23/Jun/18 05:38/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/publications.html
28 21/Jun/18 04:41/photo/stock/a131-19-1.jpg
28 0.01%22/Jun/18 11:36/publications/huang2016.QCrypt2016-subm74.pdf
28 23/Jun/18 05:37/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
28 0.01% 8/Jun/18 02:55/photo/stock/n46-8-4.jpg
28 20/Jun/18 19:26/photo/stock/n8-4-1.jpg
28 0.05%19/Jun/18 08:43/lab/pictures/20140310-satellite-prototype-detector-board-front-white.jpg
28 21/Jun/18 02:17/photo/stock/a123-5-3.jpg
27 0.01%21/Jun/18 16:08/photo/stock/a211-25-4.jpg
27 0.02%21/Jun/18 23:25/manuals/Kenwood-DLE-1041-true-RMS-programmable-multimeter-manual.pdf
27 0.01%23/Jun/18 23:26/photo/stock/a133-5-4.jpg
27 0.08%21/Jun/18 06:21/photo/stock/n98-5-5.jpg
27 23/Jun/18 05:38/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/presentations/other.html
27 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
27 21/Jun/18 02:17/photo/stock/a72-30-1.jpg
27 0.01%19/Jun/18 07:05/photo/stock/n8-9-4.jpg
27 0.01%21/Jun/18 00:33/photo/stock/a146-33-4.jpg
27 23/Jun/18 05:38/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/
27 14/Jun/18 14:44/lab/pictures/audun-bugge.jpg
27 21/Jun/18 03:30/photo/stock/a251-28-2.jpg
27 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/
27 23/Jun/18 05:38/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/other.html
27 0.06%23/Jun/18 17:52/lab/pictures/20140611-Anisimova-Bourgoin-assembling-test-plate-a.jpg
27 0.06%23/Jun/18 05:33/lab/pictures/20150401-Darya-IDQ-little-helper-v.jpg
27 23/Jun/18 05:39/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/press/
27 22/Jun/18 01:40/photo/stock/a108-25-4.jpg
27 0.01%18/Jun/18 11:30/photo/stock/n55-23-4.jpg
27 0.03%19/Jun/18 04:52/lab/pictures/20140310-satellite-prototype-detector-board-persp-loose-white.jpg
27 0.01%22/Jun/18 21:43/photo/stock/a135-35-4.jpg
27 23/Jun/18 05:39/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
27 23/Jun/18 21:29/photo/esn/me-1sfr.jpg
27 0.01%21/Jun/18 15:52/photo/stock/a65-32-4.jpg
27 0.15%22/Jun/18 20:56/lab/lecture-fiber_components_course-20031113.ppt
27 0.01%19/Jun/18 14:03/photo/family-archive/sheets/1-4.jpg
27 0.01%22/Jun/18 18:36/photo/stock/n22-2-4.jpg
27 22/Jun/18 00:25/photo/stock/a100-24-4.jpg
27 0.01%21/Jun/18 05:14/photo/stock/n89-16-4.jpg
27 18/Jun/18 22:32/photo/stock/a106-3-3.jpg
27 23/Jun/18 05:41/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/
27 0.01%23/Jun/18 20:24/photo/stock/201203-Anisimova-Makarov-4.jpg
26 20/Jun/18 20:52/photo/stock/n7-16-3.jpg
26 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/press/publications.html
26 17/Jun/18 20:45/photo/group-photo-coupon-3.gif
26 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/
26 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/
26 15/Jun/18 23:44/photo/stock/a135-35-3.jpg
26 23/Jun/18 23:08/photo/stock/n7-18-1.jpg
26 23/Jun/18 17:15/lab/pictures/sarah-kaiser-20121019-1s.jpg
26 0.21%19/Jun/18 12:22/lab/presentations/idQ_winter_school_20100210-Practical-attacks-on-QKD-implementations.ppt
26 0.01%18/Jun/18 21:16/photo/stock/n10-8-4.jpg
26 22/Jun/18 04:54/photo/stock/n20-13-4.jpg
26 0.08%12/Jun/18 13:23/lab/pictures/20150510-Anisimova-Makarova-Lim.jpg
26 0.01%18/Jun/18 11:27/photo/stock/n8-4-4.jpg
26 0.01%21/Jun/18 19:12/photo/stock/a286-36-4.jpg
26 23/Jun/18 05:38/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/
26 19/Jun/18 23:41/photo/stock/n13-24-1.jpg
26 0.01%23/Jun/18 21:26/photo/stock/n25-13-4.jpg
26 0.01%19/Jun/18 21:32/lab/pictures/Shihan-Sajeed-20130213.jpg
26 20/Jun/18 02:15/photo/stock/n13-24-3.jpg
26 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/press/press/
26 20/Jun/18 22:08/lab/pictures/Ruoping-Li.jpg
26 22/Jun/18 23:55/photo/stock/n37-15-3.jpg
26 0.01%20/Jun/18 19:27/photo/stock/a60-7-4.jpg
26 19/Jun/18 23:41/photo/stock/n28-20-1.jpg
26 22/Jun/18 12:15/photo/stock/n65-35-3.jpg
26 0.01%13/Jun/18 15:05/photo/stock/a230-16-4.jpg
26 20/Jun/18 23:31/lab/pictures/oestein-maroey-20081114-1s.jpg
26 0.01%19/Jun/18 05:01/photo/stock/a3-13-4.jpg
25 22/Jun/18 22:02/photo/stock/a297-31-3.jpg
25 19/Jun/18 23:41/photo/stock/n8-6-1.jpg
25 23/Jun/18 15:47/lab/pictures/sarah-kaiser-20121019.jpg
25 22/Jun/18 17:55/photo/stock/n54-5-3.jpg
25 23/Jun/18 05:37/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/
25 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
25 0.01%21/Jun/18 01:24/photo/stock/a256-9-4.jpg
25 17/Jun/18 04:21/photo/stock/a215-4-3.jpg
25 0.01% 1/Jun/18 17:46/photo/stock/a92-17-4.jpg
25 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/other.html
25 0.01%22/Jun/18 22:00/photo/stock/a253-8-4.jpg
25 23/Jun/18 05:43/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/publications.html
25 19/Jun/18 23:41/photo/stock/n40-2-1.jpg
25 0.01%23/Jun/18 16:27/photo/stock/a292-20-4.jpg
25 0.01%22/Jun/18 08:34/photo/stock/a181-12-4.jpg
25 0.01%22/Jun/18 18:23/photo/stock/a14-6-4.jpg
25 22/Jun/18 12:12/photo/dirty-scanner/flatbed-hotpixels-3.jpg
25 0.01%21/Jun/18 07:18/photo/stock/20090226-bob-control-experiment-whole-setup-4.jpg
25 0.02%23/Jun/18 17:33/lab/pictures/20140613-radiation-testing-bench.jpg
25 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/
25 23/Jun/18 00:09/photo/stock/a130-36-3.jpg
25 0.16%21/Jun/18 00:37/lab/presentations/Makarov-20150710-Telecom-ParisTech.pdf
25 23/Jun/18 08:09/photo/filmform-header-4.gif
25 0.05%23/Jun/18 17:26/lab/pictures/20140611-test-plate-back.jpg
25 0.01% 7/Jun/18 17:08/lab/pictures/Poompong-Chaiwongkhot.jpg
25 23/Jun/18 04:46/lab/pictures/Olivia-De-Matteo-1s.jpg
25 0.01%23/Jun/18 02:11/photo/phd-defence-20070430/makarov-phd-defence-20070430-11-5.jpg
25 0.05%22/Jun/18 12:49/publications/chaiwongkhot2015.QCrypt2015-subm46.pdf
25 0.01%21/Jun/18 05:44/photo/dirty-scanner/np-leaf.jpg
25 0.04%19/Jun/18 14:11/lab/pictures/20131011-Clavis-with-dinosaurs.jpg
25 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
25 0.01%20/Jun/18 08:46/photo/stock/a294-4-4.jpg
25 21/Jun/18 06:11/photo/stock/n10-8-1.jpg
25 20/Jun/18 21:09/photo/dirty-scanner/ls4000-ghosts-90deg-fr.jpg
25 18/Jun/18 19:00/photo/stock/a292-20-3.jpg
25 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/
25 22/Jun/18 13:58/publications/sajeed2016.SPIE-laser-damage-symposium.pdf
25 0.07%15/Jun/18 18:02/photo/stock/201203-Makarov-1-5.jpg
25 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/
25 0.01%18/Jun/18 14:34/photo/stock/n9-1-4.jpg
25 19/Jun/18 23:41/photo/stock/n90-33-1.jpg
25 0.10%23/Jun/18 07:04/photo/stock/a251-28-5.jpg
25 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
24 0.01%21/Jun/18 05:57/photo/stock/a92-2-4.jpg
24 16/Jun/18 02:17/photo/stock/a253-25-2.jpg
24 19/Jun/18 13:20/photo/phd-defence-20070430/makarov-phd-defence-20070430-09-2.jpg
24 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/people.html
24 23/Jun/18 05:38/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
24 0.06%20/Jun/18 09:36/lab/pictures/20160812-Lim-shows-APD-testing-setup-labQNC3301-1.jpg
24 21/Jun/18 03:40/photo/stock/a146-33-1s.jpg
24 0.01%20/Jun/18 13:55/photo/stock/a285-18-4.jpg
24 0.01%19/Jun/18 23:42/photo/stock/quantum-hacking-group-groenlia20080923-4.jpg
24 0.04%23/Jun/18 19:04/lab/pictures/20140612-irradiation-counter.jpg
24 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/press/full-eavesdropping-2011/
24 23/Jun/18 05:42/lab/pictures.html/press/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
24 12/Jun/18 03:57/photo/stock/n38-3-3.jpg
24 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
24 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
24 0.09%20/Jun/18 01:03/lab/pictures/20150610-FRISC-workshop-Reykjavik-group-picture-in-Secret-Lagoon.jpg
24 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/
24 0.16%23/Jun/18 03:08/photo/stock/n13-36-5.jpg
24 23/Jun/18 18:13/photo/stock/n8-32-1.jpg
24 0.01%22/Jun/18 13:32/photo/family-archive/sheets/13-4.jpg
24 23/Jun/18 05:41/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/conferences.html
24 0.01%21/Jun/18 07:20/photo/stock/n65-35-4.jpg
24 23/Jun/18 05:43/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/publications.html
24 18/Jun/18 03:25/photo/stock/a292-32-3.jpg
24 23/Jun/18 05:43/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/
24 0.01%22/Jun/18 21:07/photo/stock/a210-25-4.jpg
24 23/Jun/18 05:42/lab/pictures.html/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/
24 23/Jun/18 15:22/photo/stock/a253-8-1s.jpg
24 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/conferences.html
24 22/Jun/18 18:23/lab/poster-minsk-200605/poster-minsk-200605-thumbn.jpg
24 0.01%20/Jun/18 18:02/photo/stock/a7-24-4.jpg
24 19/Jun/18 14:50/photo/esn/me-2.jpg
24 18/Jun/18 06:53/photo/stock/n14-32-3.jpg
24 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
24 23/Jun/18 05:42/lab/pictures.html/press/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/
24 19/Jun/18 12:14/photo/stock/n99-18-3.jpg
24  9/Jun/18 12:16/photo/stock/n13-36-2.jpg
24 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/other.html
24 19/Jun/18 05:01/photo/stock/a92-17-3.jpg
24 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
24 18/Jun/18 19:19/lab/pictures/QNC3-20110822-3s.jpg
24 23/Jun/18 11:14/photo/stock/n29-5-3.jpg
24 23/Jun/18 05:45/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
24 22/Jun/18 21:20/photo/stock/a17-8-4.jpg
24 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/
24 23/Jun/18 05:43/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/people.html
24 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
24 18/Jun/18 17:49/photo/family-archive/pattern-blending-ex-after.jpg
24 0.03% 7/Jun/18 11:03/lab/pictures/20140310-satellite-prototype-detector-board-persp-loose-black.jpg
24 23/Jun/18 05:42/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
24 0.09%19/Jun/18 05:59/photo/stock/a84-28-5.jpg
24 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
24 0.05%18/Jun/18 22:23/lab/nor-crypto-200210.ppt
24 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
24 0.01%21/Jun/18 12:08/photo/stock/20100630-spy-suitcase-for_Gemini_magazine-4.jpg
23 19/Jun/18 23:41/photo/stock/a12-24-1.jpg
23 18/Jun/18 09:53/photo/phd-defence-20070430/makarov-phd-defence-20070430-11-2.jpg
23 18/Jun/18 09:53/photo/phd-defence-20070430/makarov-phd-defence-20070430-02-2.jpg
23 0.01%23/Jun/18 07:36/photo/stock/a178-33-4.jpg
23 21/Jun/18 23:28/photo/stock/a252-32-2.jpg
23 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
23 23/Jun/18 03:56/photo/stock/n54-17-3.jpg
23 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
23 18/Jun/18 18:14/photo/stock/n13-36-3.jpg
23 21/Jun/18 06:28/photo/stock/n8-8-3.jpg
23 23/Jun/18 05:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/
23 0.01%23/Jun/18 02:01/photo/stock/n57-29-4.jpg
23 0.01%22/Jun/18 07:33/photo/stock/a41-20-4.jpg
23 0.06%21/Jun/18 06:39/photo/stock/a291-18-5.jpg
23 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
23 28/May/18 23:28/lab/pictures/20120929-QNC-open-house-img5050.jpg
23 19/Jun/18 23:40/photo/stock/a176-22-1.jpg
23 0.04%21/Jun/18 04:52/photo/stock/a294-4-5.jpg
23 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
23 0.01%22/Jun/18 23:43/photo/stock/n84-28-4.jpg
23  9/Jun/18 10:24/photo/stock/n22-2-3.jpg
23 23/Jun/18 05:43/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/press/
23 0.05%19/Jun/18 07:11/lab/pictures/20140310-satellite-prototype-detector-board-back-black.jpg
23 18/Jun/18 13:06/photo/stock/20090705-eavesdropping-experiment-on-nus-campus-map-3.jpg
23 19/Jun/18 23:41/photo/stock/n9-1-1.jpg
23 0.01%18/Jun/18 11:40/photo/stock/a274-33-4.jpg
23 0.10%22/Jun/18 16:31/photo/stock/a285-7-5.jpg
23 23/Jun/18 05:46/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/
23 0.01%19/Jun/18 00:08/photo/stock/a11-5-4.jpg
23 0.01%19/Jun/18 00:02/photo/stock/a140-33-4.jpg
23 23/Jun/18 05:43/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
23 0.01%19/Jun/18 23:21/photo/stock/20110919-Lydersen-defence-group-photo-4.jpg
23 23/Jun/18 05:46/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
23 0.05%14/Jun/18 05:47/photo/stock/a181-15-5.jpg
23 21/Jun/18 23:54/photo/stock/a141-11-3.jpg
23 21/Jun/18 16:07/photo/stock/a211-36-3.jpg
23 0.02%16/Jun/18 11:26/lab/pictures/La-Palma-JKT-tracking-beam-4.jpg
23 22/Jun/18 21:47/icons/image2.gif
23 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/
23 0.01%18/Jun/18 00:36/photo/stock/a208-31-4.jpg
23 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/people.html
23 23/Jun/18 02:18/photo/stock/a43-12-3.jpg
23 0.01%22/Jun/18 21:05/photo/stock/n98-5-4.jpg
23 0.01%21/Jun/18 00:16/photo/stock/n24-27-4.jpg
23 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/
23  9/Jun/18 23:27/photo/stock/n65-35flare-1s.jpg
23 19/Jun/18 23:41/photo/stock/n20-13-1.jpg
23 0.01%23/Jun/18 02:33/photo/stock/n17-26-4.jpg
23 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
23 0.04%19/Jun/18 12:11/photo/stock/a181-12-5.jpg
23 0.01%22/Jun/18 22:19/photo/stock/n20-34-4.jpg
23 21/Jun/18 03:28/photo/stock/n20-13-3.jpg
23 22/Jun/18 19:14/photo/stock/20090226-bob-control-experiment-whole-setup-3.jpg
23 23/Jun/18 05:45/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/other.html
23 23/Jun/18 05:31/photo/stock/n37-32-3.jpg
23 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/
23 0.01%19/Jun/18 10:26/photo/family-archive/vm-20080322-kwanghanru-4.jpg
23 0.01%22/Jun/18 17:38/photo/stock/a134-13-4.jpg
23 23/Jun/18 05:45/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/
23 23/Jun/18 15:49/lab/pictures/Krtin-Kumar-2scr.jpg
23 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
23 0.07%23/Jun/18 23:36/photo/stock/a297-16-5.jpg
23 23/Jun/18 05:47/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/people.html
23 23/Jun/18 05:47/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/
23 19/Jun/18 13:32/photo/dirty-scanner/ls4000-ghosts-fr.jpg
23 21/Jun/18 22:48/photo/stock/a12-24-1s.jpg
23 0.01% 7/Jun/18 11:46/photo/stock/n85-2-4.jpg
22 16/Jun/18 02:17/photo/stock/a211-36-2.jpg
22 0.01%20/Jun/18 22:41/photo/phd-defence-20070430/makarov-phd-defence-20070430-08-5.jpg
22 23/Jun/18 05:47/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
22 0.03%19/Jun/18 20:55/lab/press/cartwright2014.PhysWorld-27-iss2-6.pdf
22 23/Jun/18 05:47/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/
22 0.05%20/Jun/18 19:42/photo/stock/a275-4-5.jpg
22 0.02%21/Jun/18 07:14/lab/pictures/qin-liu-20081114.jpg
22 0.01%20/Jun/18 17:11/photo/stock/a213-32-4.jpg
22 21/Jun/18 04:22/photo/stock/a60-7-3.jpg
22 0.07%23/Jun/18 17:37/lab/pictures/20140612-proton-beam-dump.jpg
22 23/Jun/18 05:47/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/conferences.html
22 0.01%23/Jun/18 05:40/photo/stock/a24-26-4.jpg
22 23/Jun/18 19:28/lab/pictures/magne-gudmundsen-20081114-1s.jpg
22 23/Jun/18 05:47/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
22 0.04%19/Jun/18 07:24/lab/pictures/20140310-satellite-prototype-detector-board-front-black.jpg
22 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
22 23/Jun/18 05:46/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/
22 0.01%22/Jun/18 13:24/photo/family-archive/sheets/9-4.jpg
22 0.01%19/Jun/18 16:12/photo/stock/a18-33-4.jpg
22 21/Jun/18 04:46/photo/stock/a134-7-2.jpg
22 19/Jun/18 23:41/photo/stock/n9-20-1.jpg
22 0.01%23/Jun/18 00:58/photo/stock/20100126-QPN5505-Alice-and-Bob-4.jpg
22 23/Jun/18 18:53/photo/stock/a48-13-1.jpg
22 0.01%22/Jun/18 07:39/photo/family-archive/vm-20080322-kwanghanru-3.jpg
22 0.01%22/Jun/18 17:59/photo/stock/a295-5-4.jpg
22 0.05%15/Jun/18 02:56/lab/pictures/20150610-FRISC-workshop-Reykjavik-group-picture-with-superjeep-on-snow.jpg
22 0.01%17/Jun/18 20:06/photo/stock/a146-24-4.jpg
22 0.05%20/Jun/18 01:39/photo/family-archive/vm-20080322-kwanghanru-5.jpg
22 0.01%21/Jun/18 05:28/photo/stock/a297-16-4.jpg
22 19/Jun/18 23:41/photo/stock/n40-17-3.jpg
22 0.01%22/Jun/18 09:51/photo/family-archive/sheets/4-4.jpg
22 23/Jun/18 20:40/photo/stock/201203-Anisimova-Makarov-3.jpg
22 19/Jun/18 23:40/photo/stock/a194-29crop-2s.jpg
22 0.02%18/Jun/18 10:27/lab/pictures/Hao-Qin.jpg
22 0.08%20/Jun/18 07:30/photo/stock/20090226-bob-control-experiment-eve-faked-state-generator-5.jpg
22 0.05%22/Jun/18 12:28/photo/stock/a211-25-5.jpg
22 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/
22 0.01%23/Jun/18 15:55/photo/phd-defence-20070430/makarov-phd-defence-20070430-09-5.jpg
22 23/Jun/18 21:58/lab/pictures/lars-lydersen-20081114-1s.jpg
22 0.03%19/Jun/18 22:09/photo/stock/a285-18-5.jpg
22 0.07%18/Jun/18 07:04/lab/pictures/20140612-Piche-checking-residual-radiation-after-irradiation-test.jpg
22 17/Jun/18 16:24/photo/stock/a132-8-1s.jpg
22 0.01%19/Jun/18 07:00/photo/phd-defence-20070430/makarov-phd-defence-20070430-02-5.jpg
22 0.02%23/Jun/18 06:30/lab/pictures/harald-landro-20081114.jpg
22 23/Jun/18 21:42/photo/stock/n97-37-3.jpg
22 21/Jun/18 12:44/photo/stock/a193-17crop-4.jpg
22 0.06%23/Jun/18 17:36/lab/pictures/20140612-interlock-panel.jpg
22 24/May/18 04:51/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/style.css
22 20/Jun/18 23:29/photo/stock/n39-35-1.jpg
22 0.02%22/Jun/18 20:17/lab/pictures/Tenerife-OGS-tracking-beam-4.jpg
22 23/Jun/18 05:50/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/publications.html
22 0.01%19/Jun/18 18:34/photo/stock/a274-33-3.jpg
22 18/Jun/18 01:23/photo/stock/200807-id3110-alice_sn08008F030-bob_sn08008F130-3.jpg
22 20/Jun/18 20:27/photo/dirty-scanner/np-photosmart.jpg
22 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
22 19/Jun/18 23:41/photo/stock/n23-28-1.jpg
21 21/Jun/18 19:58/photo/stock/a286-36-3.jpg
21 18/Jun/18 12:00/lab/pictures/La-Palma-JKT-tracking-beam-2-2.jpg
21 23/Jun/18 05:49/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
21 0.01%18/Jun/18 06:41/photo/stock/a106-19-4.jpg
21 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
21 23/Jun/18 19:06/lab/pictures/20140310-satellite-prototype-detector-board-persp-loose-white-2lcr.jpg
21 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
21 0.01%21/Jun/18 16:07/photo/stock/a211-36-4.jpg
21 18/Jun/18 17:39/photo/stock/a299-3-boxes-labeled-2.jpg
21 0.01%21/Jun/18 04:59/photo/stock/a19-1-4.jpg
21 18/Jun/18 05:30/photo/stock/n98-5-3.jpg
21 0.05%18/Jun/18 07:10/photo/stock/20090106-suitcase-painting-5.jpg
21 23/Jun/18 16:51/photo/stock/a9-19-2.jpg
21 21/Jun/18 07:14/photo/stock/n20-32-1.jpg
21 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
21 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/
21 30/May/18 18:07/photo/foundview/art/fvMac.eps
21 23/Jun/18 18:01/photo/stock/a135-35-slide-frame-1.jpg
21 23/Jun/18 05:48/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/
21 18/Jun/18 23:36/photo/stock/a256-21-3.jpg
21 0.01%22/Jun/18 04:04/photo/stock/a177-16-4.jpg
21 0.04%23/Jun/18 01:05/photo/stock/a299-3-5.jpg
21 0.01%22/Jun/18 22:11/photo/stock/a213-34-4.jpg
21 14/Jun/18 11:55/photo/stock/a141-36-3.jpg
21 23/Jun/18 05:49/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/presentations/
21 23/Jun/18 05:52/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/press/press/
21 18/Jun/18 18:30/photo/stock/a141-27-3.jpg
21 21/Jun/18 03:37/photo/stock/n40-2-3.jpg
21 31/May/18 12:03/lab/pictures/20130523-QHlab-Kaiser-Bennett-Davidovich-2.jpg
21 0.01%18/Jun/18 00:01/photo/stock/n80-33-4.jpg
21 0.02%21/Jun/18 05:29/lab/pictures/group.jpg
21 0.01%23/Jun/18 15:53/photo/stock/a208-36-4.jpg
21 22/Jun/18 22:09/photo/stock/a191-9-1.jpg
21  2/Jun/18 04:55/photo/foundview/art/fvIBM.eps
21 12/Jun/18 09:12/photo/stock/a23-9-2.jpg
21 23/Jun/18 05:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
21 0.01%20/Jun/18 23:39/photo/stock/a5-17-4.jpg
21 0.05%20/Jun/18 19:00/photo/stock/n85-2-5.jpg
21 0.01% 8/Jun/18 01:52/lab/pictures/20140310-satellite-prototype-detector-board-persp-loose-white-5.jpg
21 0.01%22/Jun/18 16:45/photo/family-archive/sheets/17-4.jpg
21 23/Jun/18 05:50/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
21 21/Jun/18 02:28/photo/dirty-scanner/photosmart-grid.jpg
21 0.01%23/Jun/18 04:35/photo/stock/a23-9-4.jpg
21  7/Jun/18 02:01/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/other.html
21 23/Jun/18 05:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
21 21/Jun/18 05:57/photo/stock/a178-33-3.jpg
21 19/Jun/18 23:41/photo/stock/a27-17-1.jpg
21 0.02%19/Jun/18 02:51/photo/stock/a290-32-4.jpg
21 0.01%19/Jun/18 20:28/photo/stock/a104-30-4.jpg
21 19/Jun/18 15:56/photo/stock/a193-1-2.jpg
21 18/Jun/18 00:45/lab/pictures/Carter-Minshull-20130611.jpg
21 0.01%19/Jun/18 17:42/photo/stock/n20-32-4.jpg
21 23/Jun/18 05:50/lab/pictures.html/press/full-eavesdropping-2011/conferences.html
21 0.01%23/Jun/18 01:21/publications/joshi2018.NewJPhys-20-063016.pdf
21 0.01%23/Jun/18 20:47/photo/stock/a92-20-4.jpg
21 23/Jun/18 05:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
21 19/Jun/18 23:41/photo/stock/n18-24-1.jpg
21 19/Jun/18 23:54/photo/stock/20090705-eavesdropping-experiment-on-nus-campus-map-2.jpg
21 22/Jun/18 11:56/photo/stock/a18-33-3.jpg
21  7/Jun/18 02:01/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
21 0.01%19/Jun/18 19:56/photo/stock/a179-4-4.jpg
21 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
21 16/Jun/18 11:06/lab/pictures/eivind-sjoetun-simonsen-1s.jpg
21 0.01%22/Jun/18 16:38/photo/family-archive/sheets/14-4.jpg
21 22/Jun/18 11:05/photo/family-archive/sheets/6b-4.jpg
21 23/Jun/18 05:51/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/publications.html
21 0.01%20/Jun/18 07:58/photo/phd-defence-20070430/makarov-phd-defence-20070430-06-5.jpg
21 23/Jun/18 05:51/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/
21 0.01%19/Jun/18 04:35/photo/stock/a8-20-4.jpg
21 23/Jun/18 21:54/photo/stock/a5-17-3.jpg
20 0.01%23/Jun/18 05:42/photo/stock/20090226-bob-control-experiment-eve-faked-state-generator-4.jpg
20 23/Jun/18 05:52/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
20 23/Jun/18 03:08/photo/stock/n23-17-3.jpg
20 0.01%22/Jun/18 15:54/photo/family-archive/sheets/5-4.jpg
20 0.04%20/Jun/18 21:39/lab/pictures/20140310-satellite-prototype-detector-board-back-white.jpg
20 23/Jun/18 05:52/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/
20 19/Jun/18 18:48/photo/stock/n25-13-3.jpg
20 23/Jun/18 03:28/photo/stock/n24-27-1.jpg
20 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/
20 0.01%23/Jun/18 00:08/photo/stock/n28-36-4.jpg
20 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/
20 23/Jun/18 03:25/photo/stock/n22-13-3.jpg
20 19/Jun/18 23:41/photo/stock/n16-4-1.jpg
20 22/Jun/18 19:49/photo/family-archive/sheets/11-4.jpg
20 22/Jun/18 12:43/photo/family-archive/sheets/11b-4.jpg
20 0.01%21/Jun/18 20:59/photo/stock/a252-32-4.jpg
20 23/Jun/18 05:52/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
20 23/Jun/18 05:52/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
20 23/Jun/18 05:52/lab/pictures.html/press/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
20 19/Jun/18 05:24/lab/pictures/Carter-Minshull-20130611-1s.jpg
20 0.02%23/Jun/18 03:52/lab/pictures/20090815-HAR-quantum-eavesdropper-demo-4.jpg
20 0.03%21/Jun/18 04:25/photo/foundview/art/fvMac.tif
20 23/Jun/18 05:52/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
20 23/Jun/18 05:49/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
20 19/Jun/18 23:40/photo/stock/a230-16-1.jpg
20 18/Jun/18 11:26/photo/family-archive/pattern-blending-ex-before.jpg
20 21/Jun/18 19:40/photo/stock/n17-26-3.jpg
20 18/Jun/18 09:53/photo/phd-defence-20070430/makarov-phd-defence-20070430-06-2.jpg
20 0.01%19/Jun/18 13:08/photo/stock/a25-27-4.jpg
20 19/Jun/18 05:48/photo/stock/a56-2-3.jpg
20 0.01%19/Jun/18 17:10/photo/stock/201203-Makarov-1-4.jpg
20 19/Jun/18 23:40/photo/stock/a194-15crop-2s.jpg
20 23/Jun/18 04:39/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/other.html
20 23/Jun/18 05:52/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/
20 18/Jun/18 13:59/photo/stock/n30-32-3.jpg
20 23/Jun/18 05:50/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
20 23/Jun/18 05:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
20 0.05%20/Jun/18 22:44/photo/stock/a292-32-5.jpg
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/press/
20 10/Jun/18 16:57/photo/stock/n85-2-3.jpg
20 0.01%23/Jun/18 15:50/photo/stock/a215-12-4.jpg
20 0.01%18/Jun/18 04:04/photo/stock/a74-3-4.jpg
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/presentations/hacking-commercial-quantum-cryptography-2010/
20 23/Jun/18 05:50/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/people.html
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
20 0.06%20/Jun/18 21:23/photo/stock/a253-25-5.jpg
20 15/Jun/18 22:45/photo/stock/a67-23-3.jpg
20 23/Jun/18 05:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/
20  7/Jun/18 02:02/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/
20 0.03%19/Jun/18 12:12/photo/stock/quantum-hacking-group-groenlia20080923-5.jpg
20 0.04%19/Jun/18 10:56/lab/present-attacks-via-optical-loopholes-erlangen-200409/present-attacks-via-optical-loopholes-erlangen-200409.ppt
20 0.01%17/Jun/18 15:47/photo/stock/a281-33-4.jpg
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/presentations/other.html
20 18/Jun/18 00:57/photo/stock/a134-13-1s.jpg
20 20/Jun/18 09:38/lab/torbjoern/preface.pdf
20 18/Jun/18 00:27/photo/stock/a256-29-3.jpg
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
20 0.01%22/Jun/18 08:55/photo/stock/a299-3-4.jpg
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/presentations/press/
20 27/May/18 00:34/lab/pictures/Tenerife-OGS-tracking-beam-2-3.jpg
20 23/Jun/18 05:53/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
20 23/Jun/18 05:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/conferences.html
20 23/Jun/18 05:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/people.html
20  7/Jun/18 02:03/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/other.html
20 23/Jun/18 05:50/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
20 18/Jun/18 01:38/photo/stock/a132-4-1s.jpg
20 23/Jun/18 05:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/
20 19/Jun/18 23:41/photo/stock/brygga-panorama-1.jpg
20 23/Jun/18 05:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/other.html
20 0.01%18/Jun/18 09:12/photo/stock/n51-6-4.jpg
20 0.01%19/Jun/18 01:46/photo/stock/a56-2-4.jpg
20 23/Jun/18 05:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
20 0.01%22/Jun/18 09:59/photo/family-archive/sheets/3-4.jpg
20 0.04%18/Jun/18 05:29/photo/stock/a295-5-5.jpg
20 21/Jun/18 04:00/photo/stock/a140-33-3.jpg
20 21/Jun/18 22:38/photo/filmform-header-3.gif
20 23/Jun/18 05:54/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/presentations/publications.html
32449324.67%23/Jun/18 23:58[not listed: 212,532 files]