Author of the publication

Quantum sealed-bid auction protocol with post-confirmation based on blind signature.

, , and . Quantum Inf. Process., 23 (3): 70 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimodal Software Defect Severity Prediction Based on Sentiment Probability., , , , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 250-265. Springer, (2023)Cross-Border Data Security from the Perspective of Risk Assessment., , , , , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 91-104. Springer, (2023)A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning., , , , , , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 342-351. Springer, (2021)Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme., , , , , , , and . Frontiers Comput. Sci., 18 (2): 182815 (April 2024)Quantum sealed-bid auction protocol with post-confirmation based on blind signature., , and . Quantum Inf. Process., 23 (3): 70 (March 2024)Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey., , , , , , , and . DSN Workshops, page 141-146. IEEE, (2022)Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection., , , , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)Research on Security Assessment of Cross Border Data Flow., , , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 327-341. Springer, (2021)