The Mathematical Intelligencer

, Volume 23, Issue 4, pp 15–17 | Cite as

Social influences on quantum mechanics?-I

  • Jane CroninEmail author
Department Mathematical communities


Hide Variable Quantum Cryptography Physical Review Letter Mathematical Community Copenhagen Interpretation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Ballantine, Leslie C,Quantum Mechanics, A Modem Development, World Scientific, Singapore, 1998.CrossRefGoogle Scholar
  2. [2]
    Bell, J. S.,Speakable and Unspeakable in Quantum Mechanics, Cambridge University Press, Cambridge, 1987.zbMATHGoogle Scholar
  3. [3]
    Bohm, David,Quantum Theory, Prentice-Hall, Inc. New York, 1951.Google Scholar
  4. [4]
    Bohm, D. and Aharanov, Y. Discussion of experimental proof for the paradox of Einstein, Rosen, and Podolsky,Physical Review (108) 1070–1076, 1957.CrossRefMathSciNetGoogle Scholar
  5. [5]
    Einstein, A., Podolsky, B., Rosen, N., Can quantum mechanical description of physical reality be considered complete?Physical Review (47) 777–780, 1935.CrossRefzbMATHGoogle Scholar
  6. [6]
    Ekert, Artur K., Quantum cryptography based on Bell’s Theorem,Physical Review Letters (67) 661–663, 1991.CrossRefzbMATHMathSciNetGoogle Scholar
  7. [7]
    Gell-Mann, Murray,The Nature of the Physical Universe, John Wiley & Sons, Inc., New York, 1976.Google Scholar
  8. [8]
    Hermann, G., Die naturphilosophischen Grundlagen der Quantenmechanik,Abhandlungen der Fries’ chen Schule (6) 75–152, 1935.Google Scholar
  9. [9]
    Jammer, Max,The Philosophy of Quantum Mechanics, John Wiley & Sons, New York, 1974.Google Scholar
  10. [10]
    Jennewein, Thomas; Simon, Christoph; Weibs, Gregor; Weinfurter, Harald; Zeilinger, Anton. Quantum cryptography with entangled photons,Physical Review Letters (84) 4729–4732, 2000.CrossRefGoogle Scholar
  11. [11]
    Mermin, N. David, Hidden variables and two theorems of John Bell,Reviews of Modern Physics (55) 803–815, 1993.CrossRefMathSciNetGoogle Scholar
  12. [12]
    Naik, D. S., Peterson, C. G., White, A. G., Berglund, A. J., Kwiat, P. G., Entangled state quantum cryptography: eavesdropping on the Ekert protocol,Physical Review Letters (84) 4733–4736, 2000.CrossRefGoogle Scholar
  13. [13]
    Rae, Alastair I. M.,Quantum Mechanics, third edition, Institute of Physics Publishing, Bristol, England, 1992.zbMATHGoogle Scholar
  14. [14]
    Tittel, W., Brendel, J., Zbinden, H., Gisin, N., Quantum cryptography using entan- gled photons in energy-time Bell states.Physical Review Letters (84) 4737–4740, 2000.CrossRefGoogle Scholar
  15. [15]
    Von Neumann, J.,Mathematische Grundlagen der Quantenmechanik, Springer, Berlin, 1932. (English translation, Princeton University Press, 1955).zbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, Inc. 2001

Authors and Affiliations

  1. 1.Department of MathematicsRulgers University New BrunswickPiscalawayUSA

Personalised recommendations