Author of the publication

Key-leakage evaluation of authentication in quantum key distribution with finite resources.

, , , , and . Quantum Information Processing, 13 (4): 935-955 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reference-free-independent quantum key distribution immune to detector side channel attacks., , , , , and . Quantum Information Processing, 13 (5): 1237-1244 (2014)The application of PLC in SBMBR sewage treatment automatic control of the system., , , and . ICNSC, page 422-426. IEEE, (2011)Security of quantum key distribution with state-dependent imperfections., , , , , and . Quantum Information & Computation, 11 (11-12): 937-947 (2011)Security of practical quantum key distribution system., and . ISPACS, page 1-3. IEEE, (2011)Security of BB84 with weak randomness and imperfect qubit encoding., , , , , , and . Quantum Information Processing, 17 (3): 55 (2018)Monitoring the intercept-resend attack with the weak measurement model., , and . Quantum Information Processing, 17 (10): 257 (2018)Application dependency tracing for message oriented middleware., , , , and . APNOMS, page 1-6. IEEE, (2014)Quantum key distribution with integrated optics., , , , , , , , , and 5 other author(s). ASP-DAC, page 795-799. IEEE, (2014)A study of BB84 protocol in a device-independent scenario: from the view of entanglement distillation., , , , , and . Quantum Information & Computation, 13 (9-10): 827-832 (2013)HIT: Hybrid-Mode Information Flow Tracking with Taint Semantics Extraction and Replay., , , , and . DSN Workshops, page 75-76. IEEE Computer Society, (2018)