Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of the Ping-Pong Protocol Operation in a Noisy Quantum Channel.. CN, volume 370 of Communications in Computer and Information Science, page 354-362. Springer, (2013)Ping-Pong Protocol Eavesdropping in Almost Perfect Channels.. CN, volume 608 of Communications in Computer and Information Science, page 260-268. Springer, (2016)Closed-form formula on quantum factorization effectiveness.. Quantum Inf. Process., 12 (1): 97-108 (2013)Towards User Centric e-Learning Systems., , and . WES, volume 2512 of Lecture Notes in Computer Science, page 109-120. Springer, (2002)Confidential Deterministic Quantum Communication Using Three Quantum States. International Journal of Advanced Computer Science and Applications(IJACSA), (2011)General method for the security analysis in a quantum direct communication protocol, and . CoRR, (2013)Advances in quantum secure direct communication.. IET Quantum Commun., 2 (2): 54-62 (June 2021)An Efficient Method for Calculation of the Radiation from Copper Installations with Wideband Transmission Systems.. CN, volume 718 of Communications in Computer and Information Science, page 236-244. Springer, (2017)Interactions of Twitch Users and Their Usage Behavior., , , and . HCI (14), volume 10914 of Lecture Notes in Computer Science, page 201-213. Springer, (2018)Quantum Direct Communication Wiretapping.. CN, volume 718 of Communications in Computer and Information Science, page 287-294. Springer, (2017)