Author of the publication

Secrecy and robustness for active attack in secure network coding.

, , , and . ISIT, page 1172-1176. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bipartite discrimination of independently prepared quantum states as a counterexample of a parallel repetition conjecture., and . CoRR, (2018)Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity, , , , and . (2017)cite arxiv:1705.00171Comment: 15 pages, 5 figures.A Formal Approach to Unconditional Security Proofs for Quantum Key Distribution., , , and . UC, volume 6714 of Lecture Notes in Computer Science, page 125-137. Springer, (2011)Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication., , and . CoRR, (2020)Automated Verification of Equivalence on Quantum Cryptographic Protocols., , , , and . SCSS, volume 15 of EPiC Series in Computing, page 64-69. EasyChair, (2013)Bethe ansatz cluster expansion method for a one-dimensional delta-function Bose gas, and . Chaos, Solitons & Fractals, 15 (5): 849--858 (March 2003)Information-theoretically secure equality-testing protocol with dispute resolution., , and . ISIT, page 472-476. IEEE, (2023)Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free Public Communication., , and . ICITS, volume 10681 of Lecture Notes in Computer Science, page 166-187. Springer, (2017)Explicit calculation of the partition function of a one-dimensional delta-function bose gas, and . Chaos,Solitons & Fractals, 12 (6): 993--1003 (May 2001)Secrecy and robustness for active attack in secure network coding., , , and . ISIT, page 1172-1176. IEEE, (2017)