Author of the publication

Tree-topology-based quantum-key-relay strategy for secure multicast services.

, , , , , , and . JOCN, 12 (5): 120-132 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

exKidneyBERT: a language model for kidney transplant pathology reports and the crucial role of extended vocabularies., , , and . PeerJ Comput. Sci., (2024)High-Precision Nano-Amp Current Sensor and Obfuscation based Analog Trojan Detection Circuit., , , and . ISCAS, page 3324-3328. IEEE, (2022)The balance between spectral and spatial information to estimate straw cereal plant density at early growth stages from optical sensors., , , , and . Comput. Electron. Agric., (December 2023)Retrieving potassium levels in wheat blades using normalised spectra., , , , , , , , and . Int. J. Appl. Earth Obs. Geoinformation, (2021)Secure Communication in RIS-assisted MIMO systems: Active RIS or Passive RIS?, , , , , and . WCSP, page 803-808. IEEE, (2023)Visualization of local deposition of nebulized aerosols in a human upper respiratory tract model., , , , , , and . J. Vis., 21 (2): 225-237 (2018)A comprehensive overview of AI-enabled music classification and its influence in games., and . Soft Comput., 26 (16): 7679-7693 (2022)Tree-topology-based quantum-key-relay strategy for secure multicast services., , , , , , and . JOCN, 12 (5): 120-132 (2020)Quantum Key Distribution Over Double-Layer Quantum Satellite Networks., , , , , , and . IEEE Access, (2020)Large Delay Analog Trojans: A Silent Fabrication-Time Attack Exploiting Analog Modalities., , , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (1): 124-135 (2021)