Author of the publication

A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ States.

, , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 289-297. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving and Poisoning-Defending Federated Learning in Fog Computing., , , , and . IEEE Internet Things J., 11 (3): 5063-5077 (February 2024)Achieving low-entropy secure cloud data auditing with file and authenticator deduplication., , , , , , and . Inf. Sci., (2021)Numerical Simulation of Interior Turbulent Flow Regulation of Wet Submersible Motor., , , and . Wireless Personal Communications, 102 (2): 1443-1459 (2018)An efficiency batch authentication scheme for smart grid using binary authentication tree., , and . Int. Arab J. Inf. Technol., 16 (3): 435-441 (2019)Automatic estimation of spatial spectra via smoothing splines.. Comput. Stat., 37 (2): 565-590 (2022)Channel-augmented joint transformation for transferable adversarial attacks., , , , , , , , and . Appl. Intell., 54 (1): 428-442 (January 2024)Robust Audio Watermarking Algorithm Based on Moving Average and DCT., , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 419-429. Springer, (2019)Semi-quantum private comparison protocol with three-particle G-like states., , , , and . Quantum Inf. Process., 20 (1): 17 (2021)Quantum Fuzzy K-Means Algorithm Based on Fuzzy Theory., , and . ICAIS (1), volume 13338 of Lecture Notes in Computer Science, page 348-356. Springer, (2022)Clustering Collision Power Attack on RSA-CRT., , , , , and . Comput. Syst. Sci. Eng., 36 (2): 417-434 (2021)