Author of the publication

Object-Oriented Quantum Cryptography Simulation Model.

, , and . ICNC (4), page 599-602. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information-theoretic measures associated with rough set approximations, and . CoRR, (2011)Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols, , , , and . CoRR, (2013)An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems., , , , and . J. Medical Systems, 39 (3): 20 (2015)Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity., , , and . Sensors, 19 (14): 3144 (2019)Cryptanalysis of a multi-party quantum key agreement protocol with single particles., , , , and . Quantum Information Processing, 13 (7): 1651-1657 (2014)Integer Programming via Chaotic Ant Swarm., , , and . ICNC (4), page 489-493. IEEE Computer Society, (2007)Probabilistic Soft Sets., and . GrC, page 635-638. IEEE Computer Society, (2010)A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation., , , and . IEICE Transactions, 95-A (10): 1801-1805 (2012)Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on pq Variables., , , and . IEICE Transactions, 96-A (7): 1653-1656 (2013)Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System., , , , , , and . Wireless Personal Communications, 106 (2): 719-738 (2019)