Author of the publication

A quantum cryptographic protocol with detection of compromised server.

. Quantum Inf. Comput., 5 (7): 551-560 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RBAC Standard Rationale: Comments on Ä Critique of the ANSI Standard on Role-Based Access Control"., , and . IEEE Secur. Priv., 5 (6): 51-53 (2007)Future directions in role-based access control., and . ACM Workshop on Role-Based Access Control, ACM, (1995)The NIST model for role-based access control: towards a unified standard., , and . ACM Workshop on Role-Based Access Control, page 47-63. ACM, (2000)A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet., , and . ACM Trans. Inf. Syst. Secur., 2 (1): 34-64 (1999)Proposed NIST standard for role-based access control., , , , and . ACM Trans. Inf. Syst. Secur., 4 (3): 224-274 (2001)Combinatorial and MC/DC Coverage Levels of Random Testing., , , and . QRS Companion, page 61-68. IEEE, (2017)Detecting Vulnerabilities in Android Applications using Event Sequences., , and . QRS, page 159-166. IEEE, (2019)Measuring Combinatorial Coverage at Adobe., , , , , and . ICST Workshops, page 194-197. IEEE, (2019)A Survey of Binary Covering Arrays., , , , and . Electron. J. Comb., (2011)A quantum cryptographic protocol with detection of compromised server.. Quantum Inf. Comput., 5 (7): 551-560 (2005)