Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution., , , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 453-458. Springer, (2013)First Request First Service Entanglement Routing Scheme for Quantum Networks., , , , , , and . Entropy, 24 (10): 1404 (2022)A Pipeline Optimization Model for QKD Post-processing System., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 472-481. Springer, (2014)A Security Real-time Privacy Amplification Scheme in QKD System., , , and . J. Univers. Comput. Sci., 19 (16): 2420-2436 (2013)An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks., , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 393-407. Springer, (2013)Effects of anthraquinone extract from Rheum officinale Bail on the growth performance and physiological responses of Macrobrachium rosenbergii under high temperature stress, , and . Fish & shellfish immunology. - London, (2010)Directing orbits of chaotic systems by particle swarm optimization, , , , and . Chaos, Solitons & Fractals, 29 (2): 454--461 (July 2006)Collective motion of a class of social foraging swarms, , , and . Chaos, Solitons & Fractals, 38 (1): 277--292 (October 2008)Progress in climate prediction and weather forecast operations in China, , , and . Advances in Atmospheric Sciences, 29 (5): 943--957 (Sep 1, 2012)A Novel Worm Detection Model Based on Host Packet Behavior Ranking., , , and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 969-986. Springer, (2008)