From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Novel quantum image encryption using one-dimensional quantum cellular automata., , , , и . Inf. Sci., (2016)Using M-ary decomposition and virtual bits for visually meaningful image encryption., , , , , и . Inf. Sci., (2021)Intrusion detection: A model based on the improved vision transformer., , , , и . Trans. Emerg. Telecommun. Technol., (2022)A unidirectional certificateless proxy re-signature scheme based on lattice., , и . Trans. Emerg. Telecommun. Technol., (2022)Quantum oblivious transfer with relaxed constraints on the receiver., , , , и . Quantum Inf. Process., 14 (8): 3031-3040 (2015)Trojan-horse attacks on quantum key distribution with classical Bob., , и . Quantum Inf. Process., 14 (2): 681-686 (2015)Flexible protocol for quantum private query based on B92 protocol., , , и . Quantum Inf. Process., 13 (3): 805-813 (2014)Discriminating two non-orthogonal states against decoherence by feedback control., , , , и . Quantum Inf. Process., 19 (2): 69 (2020)Multiparty anonymous quantum communication without multipartite entanglement., , , , , , и . Quantum Inf. Process., 21 (6): 196 (2022)High-capacity measurement-device-independent deterministic secure quantum communication., , , , , и . Quantum Inf. Process., 20 (6): 203 (2021)