Author of the publication

Splitting a quantum secret without the assistance of entanglements.

, , , , and . Quantum Inf. Process., 11 (6): 1741-1750 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A collection of topological Ramsey spaces of trees and their application to profinite graph theory.. Arch. Math. Log., 57 (7-8): 939-952 (2018)A Clustering Algorithm Use SOM and K-Means in Intrusion Detection., , , and . ICEE, page 1281-1284. IEEE Computer Society, (2010)Research on key technology of certain missile aiming training simulation system software., , , , and . ICAIT, page 55-58. IEEE, (2017)Robust image restoration for rotary motion degradations and the motion parameter identification., , and . ICIP, page 501-504. IEEE, (2008)New Birthday Attacks on Some MACs Based on Block Ciphers., , , , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 209-230. Springer, (2009)Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs., , , and . IACR Cryptology ePrint Archive, (2008)Quantum private comparison against decoherence noise., , , , and . Quantum Inf. Process., 12 (6): 2191-2205 (2013)Prediction of Golgi Type II membrane proteins based on their transmembrane domains., and . Bioinform., 18 (8): 1109-1115 (2002)Pixel level segmentation of early-stage in-bag rice root for its architecture analysis., , , , , , , , , and . Comput. Electron. Agric., (2021)A Review on Numerical Development of Tidal Stream Turbine Performance and Wake Prediction., , , , , , , and . IEEE Access, (2020)