Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure rate-adaptive reconciliation., , and . ISITA, page 179-184. IEEE, (2010)QKD in Standard Optical Telecommunications Networks, , , , and . CoRR, (2010)Fundamental finite key limits for one-way information reconciliation in quantum key distribution., , , and . Quantum Information Processing, 16 (11): 280 (2017)A Discussion of Thin Client Technology for Computer Labs, , and . CoRR, (2010)Untainted Puncturing for Irregular Low-Density Parity-Check Codes., , and . IEEE Wireless Commun. Letters, 1 (6): 585-588 (2012)Rate Compatible Protocol for Information Reconciliation: An application to QKD, , , and . CoRR, (2010)QKD in Standard Optical Telecommunications Networks., , , , and . QuantumComm, volume 36 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 142-149. Springer, (2009)An information reconciliation protocol for secret-key agreement with small leakage., , , and . ISIT, page 730-734. IEEE, (2015)c&d-Learning Implementation Architecture Adapting e-Learning to Developing Countries., , and . CSEDU (1), page 89-96. INSTICC Press, (2009)Interactive Reconciliation with Low-Density Parity-Check Codes, , and . CoRR, (2010)