Author of the publication

Quantum private set intersection cardinality and its application to anonymous authentication.

, , , , and . Inf. Sci., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Label Distribution Learning Based Age-Invariant Face Recognition., , , and . PAKDD (Workshops), volume 11607 of Lecture Notes in Computer Science, page 214-222. Springer, (2019)Structural DNA Nanotechnology: Molecular Construction and Computation., , , , , , , , , and 15 other author(s). UC, volume 3699 of Lecture Notes in Computer Science, page 20-31. Springer, (2005)A novel anonymous secret sharing scheme based on BP Artificial Neural Network., , and . ICNC, page 366-370. IEEE, (2012)基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption)., , , and . 计算机科学, 43 (1): 181-185 (2016)Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain., , , , and . CoRR, (2020)HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT., , , and . IPCCC, page 1-7. IEEE, (2019)A novel privacy-preserving speech recognition framework using bidirectional LSTM., , , , and . J. Cloud Comput., (2020)Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks., , and . J. Supercomput., 71 (11): 4015-4018 (2015)Utility-efficient Differentially Private K-means Clustering based on Cluster Merging., , , , and . CoRR, (2020)A novel anonymous authentication scheme without cryptography., , and . Trans. Emerg. Telecommun. Technol., 25 (9): 875-880 (2014)