From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comment on "Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise"., , и . Quantum Inf. Process., 12 (8): 2871-2875 (2013)Probabilistic authenticated quantum dialogue., и . Quantum Inf. Process., 14 (12): 4631-4650 (2015)Quantum Key Recycling with optimal key recycling rate based on a noise level., , и . CoRR, (2020)On the security of fair blind signature scheme using oblivious transfer., и . Comput. Commun., 22 (3): 287-290 (1999)Provably secure mutual authentication and key agreement scheme with user anonymity., и . ICICS, стр. 1-5. IEEE, (2013)On the traceability on RSA-based partially signature with low computation., , , и . Appl. Math. Comput., 162 (1): 421-425 (2005)Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space., , , и . CRYPTO, том 435 из Lecture Notes in Computer Science, стр. 286-298. Springer, (1989)Security analysis of the generalized key agreement and password authentication protocol., , и . IEEE Communications Letters, 5 (11): 462-463 (2001)The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures., , и . Inf. Process. Lett., 70 (2): 79-81 (1999)A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks., и . IEEE Trans. Ind. Electron., 63 (11): 7124-7132 (2016)