Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient color image encryption by color-grayscale conversion based on steganography., , , , and . Multim. Tools Appl., 82 (7): 10835-10866 (March 2023)New gene selection method for multiclass tumor classification by class centroid., , and . J. Biomed. Informatics, 42 (1): 59-65 (2009)Novel classical post-processing for quantum key distribution-based quantum private query., , , , , and . Quantum Inf. Process., 15 (9): 3833-3840 (2016)Constructing quantum Hash functions based on quantum walks on Johnson graphs., , , , , and . Quantum Inf. Process., 17 (7): 156 (2018)Dual embedding model: a new framework for visually meaningful image encryption., , , , and . Multim. Tools Appl., 80 (6): 9055-9074 (2021)ID-Based Non-interactive Deniable Authentication Protocol.. IAS, page 479-482. IEEE Computer Society, (2009)Three-party quantum secret sharing against collective noise., , , , and . Quantum Inf. Process., 18 (7): 215 (2019)Quantum oblivious transfer with relaxed constraints on the receiver., , , , and . Quantum Inf. Process., 14 (8): 3031-3040 (2015)A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing., , , , , , and . Quantum Inf. Process., 20 (7): 1-12 (2021)Novel quantum image encryption using one-dimensional quantum cellular automata., , , , and . Inf. Sci., (2016)