Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of practical quantum key distribution system., and . ISPACS, page 1-3. IEEE, (2011)Security of quantum key distribution with state-dependent imperfections., , , , , and . Quantum Information & Computation, 11 (11-12): 937-947 (2011)The application of PLC in SBMBR sewage treatment automatic control of the system., , , and . ICNSC, page 422-426. IEEE, (2011)Reference-free-independent quantum key distribution immune to detector side channel attacks., , , , , and . Quantum Information Processing, 13 (5): 1237-1244 (2014)Monitoring the intercept-resend attack with the weak measurement model., , and . Quantum Information Processing, 17 (10): 257 (2018)Security of BB84 with weak randomness and imperfect qubit encoding., , , , , , and . Quantum Information Processing, 17 (3): 55 (2018)Quantum key distribution with integrated optics., , , , , , , , , and 5 other author(s). ASP-DAC, page 795-799. IEEE, (2014)Application dependency tracing for message oriented middleware., , , , and . APNOMS, page 1-6. IEEE, (2014)A study of BB84 protocol in a device-independent scenario: from the view of entanglement distillation., , , , , and . Quantum Information & Computation, 13 (9-10): 827-832 (2013)HIT: Hybrid-Mode Information Flow Tracking with Taint Semantics Extraction and Replay., , , , and . DSN Workshops, page 75-76. IEEE Computer Society, (2018)