From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The critical detection efficiency for closing the detection loophole of some modified Bell inequalities., , , и . Quantum Inf. Process., 18 (4): 123 (2019)Quantum private comparison protocol based on entanglement swapping of (d)-level Bell states., , , , и . Quantum Inf. Process., 12 (8): 2793-2802 (2013)A constant rounds group key agreement protocol without using hash functions., , , и . Int. J. Netw. Manag., 19 (6): 457-464 (2009)Effects of measurement dependence on 1-parameter family of Bell tests., , , и . Quantum Inf. Process., 21 (1): 28 (2022)A watermark strategy for quantum images based on quantum fourier transform., , , , и . Quantum Inf. Process., 12 (2): 793-803 (2013)Embedding in Two Least Significant Bits with Wet Paper Coding., и . CSSE (3), стр. 555-558. IEEE Computer Society, (2008)978-0-7695-3336-0.A privacy-preserving authenticated key agreement protocol with smart cards for mobile emergency services., , и . CSCWD, стр. 227-232. IEEE, (2017)Mining Protocol State Machines by Interactive Grammar Inference., , и . ICDMA, стр. 524-527. IEEE Computer Society, (2012)Distributed Steganography., , и . IIH-MSP, стр. 153-156. IEEE Computer Society, (2011)Perfect quantum multiple-unicast network coding protocol., , , и . Quantum Inf. Process., 17 (1): 13 (2018)