Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic quantum key distribution., , and . Quantum Inf. Comput., 11 (7&8): 615-637 (2011)Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises., , and . Quantum Inf. Process., 11 (1): 113-122 (2012)Cryptanalysis and improvement in semi-quantum private comparison based on Bell states., , and . Quantum Inf. Process., 20 (3): 120 (2021)A real-time mobile emergency assistance system for helping deaf-mute people/elderly singletons., , , , and . ICCE, page 45-46. IEEE, (2016)Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags"., , and . DSIT, page 23-27. ACM, (2018)Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels., , and . Quantum Inf. Process., 12 (9): 3043-3055 (2013)A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix., , , and . Symmetry, 14 (4): 828 (2022)Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States., , , and . Entropy, 24 (10): 1408 (2022)Dynamic quantum secret sharing., , , and . Quantum Inf. Process., 12 (1): 331-344 (2013)Multi-user private comparison protocol using GHZ class states., , and . Quantum Inf. Process., 12 (2): 1077-1088 (2013)