Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix., , , and . Symmetry, 14 (4): 828 (2022)Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States., , , and . Entropy, 24 (10): 1408 (2022)Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags"., , and . DSIT, page 23-27. ACM, (2018)Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels., , and . Quantum Inf. Process., 12 (9): 3043-3055 (2013)Intercept-resend attacks on Semiquantum secret sharing and the Improvements, , , and . CoRR, (2011)Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state., , , and . Quantum Inf. Process., 22 (5): 196 (May 2023)Dynamic quantum secret sharing., , , and . Quantum Inf. Process., 12 (1): 331-344 (2013)Multi-user private comparison protocol using GHZ class states., , and . Quantum Inf. Process., 12 (2): 1077-1088 (2013)Data fusion analysis for attention-deficit hyperactivity disorder emotion recognition with thermal image and Internet of Things devices., , , , and . Softw. Pract. Exp., 51 (3): 595-606 (2021)A real-time mobile emergency assistance system for helping deaf-mute people/elderly singletons., , , , and . ICCE, page 45-46. IEEE, (2016)