Author of the publication

Perfect quantum multiple-unicast network coding protocol.

, , , and . Quantum Inf. Process., 17 (1): 13 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Local indistinguishability of multipartite orthogonal product bases., , , , and . Quantum Inf. Process., 16 (11): 276 (2017)Local distinguishability of maximally entangled states in canonical form., , , , and . Quantum Inf. Process., 14 (10): 3961-3969 (2015)Cheat sensitive quantum bit commitment via pre- and post-selected quantum states., , , , and . Quantum Inf. Process., 13 (1): 141-149 (2014)DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps., , , , , and . IEEE Access, (2020)DexX: A Double Layer Unpacking Framework for Android., , , , , and . IEEE Access, (2018)An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption., , , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 302-312. Springer, (2005)SQL Injection Attack Detection Framework Based on HTTP Traffic., , , , and . ACM TUR-C, page 179-185. ACM, (2021)Outsourced dynamic provable data possession with batch update for secure cloud storage., , , , , , and . Future Gener. Comput. Syst., (2019)Improved BV-based quantum attack on block ciphers., , , , , and . Quantum Inf. Process., 22 (1): 9 (2023)The general theory of three-party quantum secret sharing protocols over phase-damping channels., , , , and . Quantum Inf. Process., 12 (10): 3291-3304 (2013)