Author of the publication

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.

, , , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 453-458. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Semantic-Based Malware Detection System Design Based on Channels., , , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 653-662. Springer, (2014)Efficient DVFS to Prevent Hard Faults for Many-Core Architectures., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 674-679. Springer, (2014)DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation., , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 271-284. Springer, (2013)An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks., , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 393-407. Springer, (2013)A Space Information Service Forwarding Mechnism Based on Software Defined Network., and . J. Internet Serv. Inf. Secur., 7 (3): 48-60 (2017)PDA: A Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System., , and . IJDSN, (2013)ISL Reassignment Based Snapshot Routing Optimization for Polar-Orbit LEO Satellite Networks., , , , , , and . IEICE Trans. Commun., 98-B (9): 1896-1905 (2015)Exploring the Gateway-Based Distributed Location Management Schemes in LEO Satellite Networks., , , , , and . IEICE Trans. Commun., 101-B (3): 825-834 (2018)Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing., , , and . Wireless Personal Communications, 75 (3): 1591-1609 (2014)A Loop-Based Key Management Scheme for Wireless Sensor Networks., , , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 103-114. Springer, (2007)