Author of the publication

Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function.

, , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 127-138. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HTML integrity authentication based on fragile digital watermarking., , , , and . GrC, page 322-325. IEEE Computer Society, (2009)CBFS: A Clustering-Based Feature Selection Mechanism for Network Anomaly Detection., , , , and . IEEE Access, (2020)Voltage Ripple Control of Flying Capacitor Three-Level Inverter With Variable Switching Frequency PSPWM., , , and . IEEE Trans. Ind. Electron., 69 (4): 3313-3323 (2022)Adaptive Density Peaks Clustering Based on K-Nearest Neighbor and Gini Coefficient., , , , and . IEEE Access, (2020)Investigation of a Signal Demodulation Method based on Wavelet Transformation for OFDR to Enhance Its Distributed Sensing Performance., , , , , , , and . Sensors, 19 (13): 2850 (2019)An Energy-aware Spiking Neural Network Hardware Mapping based on Particle Swarm Optimization and Genetic Algorithm., , , and . CODES+ISSS, page 11-13. IEEE, (2020)Power converter-based aircraft starting/generating system emulator., , and . IECON, page 4165-4170. IEEE, (2017)Paralleled three-phase four-leg inverters for reduction of common mode current and common mode EMI., , , , and . IECON, page 7028-7033. IEEE, (2017)Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function., , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 127-138. Springer, (2021)Adaptive MPEG-4 video transmission over PSTN using buffer constraints and RTP feedback., , , , , and . ICME, page 1923-1926. IEEE Computer Society, (2004)