From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantum network coding without loss of information., , , , и . Quantum Inf. Process., 20 (2): 65 (2021)Simple hash function using discrete-time quantum walks., , , , , и . Quantum Inf. Process., 17 (8): 189 (2018)IoT Device Recognition Framework Based on Network Protocol Keyword Query., , , , , и . ICAIS (1), том 12239 из Lecture Notes in Computer Science, стр. 219-231. Springer, (2020)Novel classical post-processing for quantum key distribution-based quantum private query., , , , , и . Quantum Inf. Process., 15 (9): 3833-3840 (2016)Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing., , , и . Inf. Sci., (2019)Secure quantum network coding based on quantum homomorphic message authentication., , , и . Quantum Inf. Process., 18 (1): 14 (2019)Multipartite Entanglement for the Quantum Internet., , , и . ICC, стр. 3504-3509. IEEE, (2023)Secure Computing Protocols for Internet of Things Data Fusion Based on Set Intersection and Union Against Malicious Enemies., , , , , , , и . IEEE Internet Things J., 11 (14): 24918-24932 (июля 2024)Efficient Medical Big Data Management With Keyword-Searchable Encryption in Healthchain., , , , , , и . IEEE Syst. J., 16 (4): 5521-5532 (2022)A quantum image dual-scrambling encryption scheme based on random permutation., , и . Sci. China Inf. Sci., 62 (12): 229501 (2019)