Search

Your search keyword '"Su-Juan Qin"' showing total 30 results

Search Constraints

Start Over You searched for: Author "Su-Juan Qin" Remove constraint Author: "Su-Juan Qin" Search Limiters Full Text Remove constraint Search Limiters: Full Text
30 results on '"Su-Juan Qin"'

Search Results

1. Tripartite Svetlichny test with measurement dependence

2. Quantum Attacks on 1K-AES and PRINCE

3. Quantum discriminative canonical correlation analysis

4. Self-Testing of Symmetric Three-Qubit States

5. DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps

6. Block-encoding-based quantum algorithm for linear systems with displacement structures

7. Quantum mean centering for block-encoding-based quantum algorithm

8. Variational quantum algorithm for the Poisson equation

9. Outsourced dynamic provable data possession with batch update for secure cloud storage

10. Improved quantum algorithm for A-optimal projection

11. Quantum restricted Boltzmann machine is universal for quantum computation

12. Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage

13. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

14. Locally indistinguishable orthogonal product bases in arbitrary bipartite quantum system

15. Entanglement as a resource to distinguish orthogonal product states

16. Multipartite entanglement indicators based on monogamy relations of n-qubit symmetric states

17. Local indistinguishability of orthogonal product states

20. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

21. Analysis of Interaction Property of Bioactive Components in Flos Lonicerae Japonicae with Protein by Microdialysis Coupled with HPLC-DAD-MS

22. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

23. Quantum secret sharing via local operations and classical communication

24. Cloud Computing Real-time Task Scheduling Optimization Based on Genetic Algorithm and the Perception of Resources

25. Determination of stabilizer states

26. Cryptanalysis of the arbitrated quantum signature protocols

27. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

28. Quantum asymmetric cryptography with symmetric keys

29. Comment II on 'Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'

30. Threshold quantum cryptograph based on Grover's algorithm

Catalog

Books, media, physical & digital resources