Author of the publication

A Security Real-time Privacy Amplification Scheme in QKD System.

, , , and . J. UCS, 19 (16): 2420-2436 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mix-zones optimal deployment for protecting location privacy in VANET., , , , and . Peer-to-Peer Networking and Applications, 8 (6): 1108-1121 (2015)Towards efficient and practical network coding in delay tolerant networks., , , , , , and . Computers & Mathematics with Applications, 63 (2): 588-600 (2012)Following Routing: An Active Congestion Control Approach for Delay-Tolerant Networks., , , , and . NBiS, page 727-732. IEEE Computer Society, (2012)SMC: A Shared Memory Based SpaceWire Controller Solution., , , , and . TrustCom/ISPA/IUCC, page 1315-1322. IEEE Computer Society, (2013)Rollback Traffic Avoidance for Snapshot routing algorithm in cyclic mobile networks., , , , , and . NAS, page 151-157. IEEE Computer Society, (2015)SARM: A Congestion Control Algorithm for DTN., , , , and . UIC/ATC, page 869-875. IEEE Computer Society, (2012)Thwarting audio steganography attacks in cloud storage systems., , , , , , and . CDC, page 259-265. IEEE Computer Society, (2011)A novel steganography approach for voice over IP., , , , , and . J. Ambient Intelligence and Humanized Computing, 5 (4): 601-610 (2014)Dynamic Edge Computation Offloading for Internet of Things With Energy Harvesting: A Learning Method., , , and . IEEE Internet of Things Journal, 6 (3): 4436-4447 (2019)IBShare: A Novel InfiniBand Network Bandwidth Allocation for Cloud Datacenter., , , , and . IEICE Transactions, 96-B (6): 1425-1434 (2013)