The Mathematical Intelligencer

, Volume 23, Issue 4, pp 15–17 | Cite as

Social influences on quantum mechanics?-I

Department Mathematical communities

Keywords

Hide Variable Quantum Cryptography Physical Review Letter Mathematical Community Copenhagen Interpretation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Ballantine, Leslie C,Quantum Mechanics, A Modem Development, World Scientific, Singapore, 1998.CrossRefGoogle Scholar
  2. [2]
    Bell, J. S.,Speakable and Unspeakable in Quantum Mechanics, Cambridge University Press, Cambridge, 1987.MATHGoogle Scholar
  3. [3]
    Bohm, David,Quantum Theory, Prentice-Hall, Inc. New York, 1951.Google Scholar
  4. [4]
    Bohm, D. and Aharanov, Y. Discussion of experimental proof for the paradox of Einstein, Rosen, and Podolsky,Physical Review (108) 1070–1076, 1957.CrossRefMathSciNetGoogle Scholar
  5. [5]
    Einstein, A., Podolsky, B., Rosen, N., Can quantum mechanical description of physical reality be considered complete?Physical Review (47) 777–780, 1935.CrossRefMATHGoogle Scholar
  6. [6]
    Ekert, Artur K., Quantum cryptography based on Bell’s Theorem,Physical Review Letters (67) 661–663, 1991.CrossRefMATHMathSciNetGoogle Scholar
  7. [7]
    Gell-Mann, Murray,The Nature of the Physical Universe, John Wiley & Sons, Inc., New York, 1976.Google Scholar
  8. [8]
    Hermann, G., Die naturphilosophischen Grundlagen der Quantenmechanik,Abhandlungen der Fries’ chen Schule (6) 75–152, 1935.Google Scholar
  9. [9]
    Jammer, Max,The Philosophy of Quantum Mechanics, John Wiley & Sons, New York, 1974.Google Scholar
  10. [10]
    Jennewein, Thomas; Simon, Christoph; Weibs, Gregor; Weinfurter, Harald; Zeilinger, Anton. Quantum cryptography with entangled photons,Physical Review Letters (84) 4729–4732, 2000.CrossRefGoogle Scholar
  11. [11]
    Mermin, N. David, Hidden variables and two theorems of John Bell,Reviews of Modern Physics (55) 803–815, 1993.CrossRefMathSciNetGoogle Scholar
  12. [12]
    Naik, D. S., Peterson, C. G., White, A. G., Berglund, A. J., Kwiat, P. G., Entangled state quantum cryptography: eavesdropping on the Ekert protocol,Physical Review Letters (84) 4733–4736, 2000.CrossRefGoogle Scholar
  13. [13]
    Rae, Alastair I. M.,Quantum Mechanics, third edition, Institute of Physics Publishing, Bristol, England, 1992.MATHGoogle Scholar
  14. [14]
    Tittel, W., Brendel, J., Zbinden, H., Gisin, N., Quantum cryptography using entan- gled photons in energy-time Bell states.Physical Review Letters (84) 4737–4740, 2000.CrossRefGoogle Scholar
  15. [15]
    Von Neumann, J.,Mathematische Grundlagen der Quantenmechanik, Springer, Berlin, 1932. (English translation, Princeton University Press, 1955).MATHGoogle Scholar

Copyright information

© Springer Science+Business Media, Inc. 2001

Authors and Affiliations

  1. 1.Department of MathematicsRulgers University New BrunswickPiscalawayUSA

Personalised recommendations