Author of the publication

A security control scheme based on quantum keys for IoT terminals.

, , , and . Int. J. Secur. Networks, 18 (3): 189-198 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A QoE Estimation Model for Video Streaming over 5G Millimeter Wave Network., , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 93-104. Springer, (2016)BER performance of differential demodulation OFDM system in multipath fading channels., , , and . GLOBECOM, page 1-5. IEEE, (2003)A novel algorithm for peer-to-peer ridesharing match problem., , , and . Neural Comput. Appl., 31 (S-1): 247-258 (2019)A Remote Security Computational Ghost Imaging Method Based on Quantum Key Distribution Technology., , , , , and . IEEE Access, (2022)A security control scheme based on quantum keys for IoT terminals., , , and . Int. J. Secur. Networks, 18 (3): 189-198 (2023)Research on Health State Assessment Model of Electromechanical Actuator System for M-UAV., , , and . SAFEPROCESS, page 1-6. IEEE, (2023)Load-aware ACB Scheme for M2M Traffic in LTE-A Networks., , , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 69-80. Springer, (2016)Performance of time and frequency domain chip-level differential detection in two-dimension spread spectrum system., , and . ICC, page 2457-2461. IEEE, (2005)A study on performance evaluation model of individual knowledge-sharing., , and . CSCWD, page 219-222. IEEE, (2010)Research on innovation customer resource selection and evaluation based on wavelet network., , , , and . CSCWD, page 957-961. IEEE, (2008)