Author of the publication

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes.

, , , , and . Quantum Inf. Process., 14 (2): 697-713 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of Offline and Online Peer Influence on Customer Purchase Behavior: An Empirical Investigation., , , and . ICIS, Association for Information Systems, (2016)The resilience of interdependent transportation networks under targeted attack., , , , , , and . CoRR, (2013)Finite-time topology identification and stochastic synchronization of complex network with multiple time delays., , , , , and . Neurocomputing, (2017)Explosive synchronization transition in a ring of coupled oscillators., , , and . Commun. Nonlinear Sci. Numer. Simul., (2019)Effect of spatial distribution on the synchronization in rings of coupled oscillators., , , , and . Commun. Nonlinear Sci. Numer. Simul., 18 (10): 2769-2774 (2013)Ragged oscillation death in coupled nonidentical oscillators., , , , and . Commun. Nonlinear Sci. Numer. Simul., 19 (8): 2874-2882 (2014)High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding., , , , , , and . Quantum Inf. Process., 15 (11): 4663-4679 (2016)Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes., , , , and . Quantum Inf. Process., 13 (4): 895-907 (2014)Antecedents of User's Intention to Share Big Data The influence of User Type1., , and . PACIS, page 20. (2020)Antecedents and consequences of trust in supply chain: the role of information technology., , , and . ECIS, page 42. (2011)