Search

Your search keyword '"Su-Juan Qin"' showing total 43 results

Search Constraints

Start Over You searched for: Author "Su-Juan Qin" Remove constraint Author: "Su-Juan Qin" Topic computer science Remove constraint Topic: computer science
43 results on '"Su-Juan Qin"'

Search Results

1. Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud

2. Self-Testing of Symmetric Three-Qubit States

3. Error Tolerance Bound in QKD-Based Quantum Private Query

4. DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps

5. Outsourced dynamic provable data possession with batch update for secure cloud storage

6. Quantum restricted Boltzmann machine is universal for quantum computation

7. Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage

8. Comments on 'Provable Multicopy Dynamic Data Possession in Cloud Computing Systems'

9. Quantum private query: A new kind of practical quantum cryptographic protocol

10. The randomness in 2 $$\rightarrow $$ → 1 quantum random access code without a shared reference frame

11. Perfect quantum multiple-unicast network coding protocol

13. Novel multiparty quantum key agreement protocol with GHZ states

14. An arbitrated quantum signature scheme with fast signing and verifying

15. The general theory of three-party quantum secret sharing protocols over phase-damping channels

16. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

17. Cheat sensitive quantum bit commitment via pre- and post-selected quantum states

18. Quantum private comparison protocol based on entanglement swapping of $$d$$ -level Bell states

19. Practical quantum all-or-nothing oblivious transfer protocol

20. Entanglement as a resource to distinguish orthogonal product states

21. Improved Secure Multiparty Computation with a Dishonest Majority via Quantum Means

22. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

23. Finite-key analysis for quantum key distribution with decoy states

24. Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state

25. Multiparty quantum secret sharing with collective eavesdropping-check

28. A simple participant attack on the Bradler-Dusek protocol

29. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

30. Quantum secret sharing via local operations and classical communication

31. Cloud Computing Real-time Task Scheduling Optimization Based on Genetic Algorithm and the Perception of Resources

32. Cryptanalysis and improvement of a secure quantum sealed-bid auction

33. Cryptanalysis and improvement of a DSQC using four-particle entangled state and entanglement swapping

34. Comment on 'Controlled DSQC using five-qubit entangled states and two-step security test'

35. A special attack on the multiparty quantum secret sharing of secure direct communication using single photons

36. Quantum asymmetric cryptography with symmetric keys

37. A quantum secret-sharing protocol with fairness

38. Arbitrated quantum signature scheme based onχ-type entangled states

39. DISCUSSION ON QUANTUM PROXY GROUP SIGNATURE SCHEME WITH χ-TYPE ENTANGLED STATE

40. CRYPTANALYSIS OF THE QSDC PROTOCOL WITHOUT USING PERFECT QUANTUM CHANNEL

41. General description of discriminating quantum operations

42. Cryptanalysis of Quantum Secure Direct Communication and Authentication Scheme via Bell States

43. An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption.

Catalog

Books, media, physical & digital resources