Author of the publication

Quantum private comparison protocol based on entanglement swapping of (d)-level Bell states.

, , , , and . Quantum Inf. Process., 12 (8): 2793-2802 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption., , , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 302-312. Springer, (2005)Cheat sensitive quantum bit commitment via pre- and post-selected quantum states., , , , and . Quantum Inf. Process., 13 (1): 141-149 (2014)KRTunnel: DNS channel detector for mobile devices., , , , and . Comput. Secur., (2022)The general theory of three-party quantum secret sharing protocols over phase-damping channels., , , , and . Quantum Inf. Process., 12 (10): 3291-3304 (2013)Improved BV-based quantum attack on block ciphers., , , , , and . Quantum Inf. Process., 22 (1): 9 (2023)SQL Injection Attack Detection Framework Based on HTTP Traffic., , , , and . ACM TUR-C, page 179-185. ACM, (2021)An Ensemble Learning Framework for Credit Card Fraud Detection Based on Training Set Partitioning and Clustering., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 94-98. IEEE, (2018)Quantum Attacks on 1K-AES and PRINCE., , , , , and . Comput. J., 66 (5): 1102-1110 (May 2023)Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage., , , , , , and . Comput. J., 63 (8): 1216-1230 (2020)Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning., , , and . ICCNS, page 219-226. ACM, (2022)