Author of the publication

Standard quantum bit commitment - an indefinite commitment time.

. IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guided Web Content Mining Approach for Automated Meta-Rule Extraction and Information Retrieval., and . DMIN, page 619-625. CSREA Press, (2008)Optimizing Latencies and Customizing NoC of Time-Predictable Heterogeneous Multi-core Processor., , , and . MCSoC, page 233-240. IEEE Computer Society, (2016)JOP-plus - A processor for efficient execution of java programs extended with GALS concurrency., , and . ASP-DAC, page 17-22. IEEE, (2012)High false positive detection of security vulnerabilities: a case study., , and . ACM Southeast Regional Conference, page 359-360. ACM, (2012)Optimal Secure Information using Digital Watermarking and Fuzzy Rule base., , , and . Multimedia Tools Appl., 78 (6): 7691-7712 (2019)Memory management of safety-critical hard real-time systems designed in SystemJ., , , and . Microprocessors and Microsystems - Embedded Hardware Design, (2019)Multi-agent Based Semantic E-government Web Service Architecture Using Extended WSDL., , , and . IAT Workshops, page 599-604. IEEE Computer Society, (2006)A VLIW softcore processor with dynamically adjustable issue-slots., , and . FPT, page 393-398. IEEE, (2010)Computer Security Training Recommender for Developers., , and . RecSys Posters, volume 1247 of CEUR Workshop Proceedings, CEUR-WS.org, (2014)Quantum Cryptography Trends: A Milestone in Information Security., , , and . HIS, volume 420 of Advances in Intelligent Systems and Computing, page 25-39. Springer, (2015)