|
Other articles related with "security":
|
40301 |
Gan Gao(高甘) |
|
|
Cryptanalysis of efficient semi-quantum secret sharing protocol using single particles |
|
|
|
Chin. Phys. B
2024 Vol.33 (4): 40301-040301
[Abstract]
(118)
[HTML 0 KB]
[PDF 405 KB]
(51)
|
|
10502 |
Yiming Wang(王一铭), Shufeng Huang(黄树锋), Huang Chen(陈煌), Jian Yang(杨健), and Shuting Cai(蔡述庭) |
|
|
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding |
|
|
|
Chin. Phys. B
2024 Vol.33 (1): 10502-10502
[Abstract]
(127)
[HTML 0 KB]
[PDF 8079 KB]
(29)
|
|
100306 |
Chen-Yi Huang(黄晨猗) and Shi-Bin Zhang(张仕斌) |
|
|
A backdoor attack against quantum neural networks with limited information |
|
|
|
Chin. Phys. B
2023 Vol.32 (10): 100306-100306
[Abstract]
(110)
[HTML 0 KB]
[PDF 906 KB]
(51)
|
|
80303 |
Wenwen Hu(胡文文), Bangshu Xiong(熊邦书), and Rigui Zhou(周日贵) |
|
|
An efficient multiparty quantum secret sharing scheme using a single qudit |
|
|
|
Chin. Phys. B
2023 Vol.32 (8): 80303-080303
[Abstract]
(138)
[HTML 0 KB]
[PDF 533 KB]
(21)
|
|
120301 |
Comfort Sekga and Mhlambululi Mafu |
|
|
Three-party reference frame independent quantum key distribution protocol |
|
|
|
Chin. Phys. B
2021 Vol.30 (12): 120301-120301
[Abstract]
(418)
[HTML 0 KB]
[PDF 584 KB]
(105)
|
|
98902 |
Jiayue Wang(王嘉悦), Maik Boltes, Armin Seyfried, Antoine Tordeux, Jun Zhang(张俊), and Wenguo Weng(翁文国) |
|
|
Experimental study on age and gender differences in microscopic movement characteristics of students |
|
|
|
Chin. Phys. B
2021 Vol.30 (9): 98902-098902
[Abstract]
(384)
[HTML 1 KB]
[PDF 2334 KB]
(205)
|
|
70309 |
Jing-Wen Zhang(张静文), Xiu-Bo Chen(陈秀波), Gang Xu(徐刚), and Yi-Xian Yang(杨义先) |
|
|
Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme |
|
|
|
Chin. Phys. B
2021 Vol.30 (7): 70309-070309
[Abstract]
(597)
[HTML 1 KB]
[PDF 563 KB]
(152)
|
|
80305 |
Lin-Xi Feng(冯林溪), Mu-Sheng Jiang(江木生), Wan-Su Bao(鲍皖苏), Hong-Wei Li(李宏伟), Chun Zhou(周淳), Yang Wang(汪洋) |
|
|
Controlling a sine wave gating single-photon detector by exploiting its filtering loophole |
|
|
|
Chin. Phys. B
2018 Vol.27 (8): 80305-080305
[Abstract]
(778)
[HTML 1 KB]
[PDF 4326 KB]
(168)
|
|
120504 |
Yu-Ling Luo(罗玉玲), Rong-Long Zhou(周戎龙), Jun-Xiu Liu(刘俊秀), Sen-Hui Qiu(丘森辉), Yi Cao(曹弋) |
|
|
A novel image encryption scheme based on Kepler's third law and random Hadamard transform |
|
|
|
Chin. Phys. B
2017 Vol.26 (12): 120504-120504
[Abstract]
(717)
[HTML 0 KB]
[PDF 11861 KB]
(192)
|
|
100507 |
Kushal Anjaria, Arun Mishra |
|
|
Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs |
|
|
|
Chin. Phys. B
2017 Vol.26 (10): 100507-100507
[Abstract]
(611)
[HTML 1 KB]
[PDF 227 KB]
(159)
|
|
10501 |
Guo-Dong Ye(叶国栋), Xiao-Ling Huang(黄小玲), Leo Yu Zhang(张愉), Zheng-Xia Wang(王政霞) |
|
|
A self-cited pixel summation based image encryption algorithm |
|
|
|
Chin. Phys. B
2017 Vol.26 (1): 10501-010501
[Abstract]
(708)
[HTML 1 KB]
[PDF 8692 KB]
(546)
|
|
70303 |
Kevin Garapo, Mhlambululi Mafu, Francesco Petruccione |
|
|
Intercept-resend attack on six-state quantum key distribution over collective-rotation noise channels |
|
|
|
Chin. Phys. B
2016 Vol.25 (7): 70303-070303
[Abstract]
(604)
[HTML 1 KB]
[PDF 891 KB]
(390)
|
|
90209 |
Ma Ya-Yan (马亚燕), Wang Bao-Yun (王保云) |
|
|
Improving the secrecy rate by turning foes to allies: An auction scheme |
|
|
|
Chin. Phys. B
2015 Vol.24 (9): 90209-090209
[Abstract]
(686)
[HTML 1 KB]
[PDF 448 KB]
(273)
|
|
60509 |
Shu Jian (舒剑) |
|
|
An efficient three-party password-based key agreement protocol using extended chaotic maps |
|
|
|
Chin. Phys. B
2015 Vol.24 (6): 60509-060509
[Abstract]
(561)
[HTML 1 KB]
[PDF 245 KB]
(269)
|
|
100304 |
Zhao Liang-Yuan (赵良圆), Li Hong-Wei (李宏伟), Yin Zhen-Qiang (银振强), Chen Wei (陈巍), You Juan (尤娟), Han Zheng-Fu (韩正甫) |
|
|
Security of biased BB84 quantum key distribution with finite resource |
|
|
|
Chin. Phys. B
2014 Vol.23 (10): 100304-100304
[Abstract]
(685)
[HTML 1 KB]
[PDF 394 KB]
(573)
|
|
64201 |
Hua Li-Li (花丽丽), Xu Ning (徐宁), Yang Geng (杨庚) |
|
|
An encryption scheme based on phase-shifting digital holography and amplitude-phase disturbance |
|
|
|
Chin. Phys. B
2014 Vol.23 (6): 64201-064201
[Abstract]
(556)
[HTML 1 KB]
[PDF 1894 KB]
(577)
|
|
110503 |
Wang Xing-Yuan (王兴元), Luan Da-Peng (栾大朋) |
|
|
A secure key agreement protocol based on chaotic maps |
|
|
|
Chin. Phys. B
2013 Vol.22 (11): 110503-110503
[Abstract]
(648)
[HTML 1 KB]
[PDF 200 KB]
(1565)
|
|
20310 |
Qin Su-Juan(秦素娟) and Wen Qiao-Yan(温巧燕) |
|
|
Improving the security of secure deterministic communication scheme based on quantum remote state preparation |
|
|
|
Chin. Phys. B
2010 Vol.19 (2): 20310-020310
[Abstract]
(1791)
[HTML 1 KB]
[PDF 79 KB]
(677)
|
|
2149 |
Zhang Bin-Bin(张彬彬), Wang Da-Qing(王大庆), Huang Shan-Shan(黄珊珊), and Liu Yu(刘玉) |
|
|
Enhancing the security of quantum secret sharing against multiphoton attack |
|
|
|
Chin. Phys. B
2009 Vol.18 (6): 2149-2153
[Abstract]
(1656)
[HTML 0 KB]
[PDF 150 KB]
(686)
|
|
2254 |
Long Min(龙敏) and Qiu Shui-Sheng(丘水生) |
|
|
Application of periodic orbit theory in chaos-based security analysis |
|
|
|
Chin. Phys. B
2007 Vol.16 (8): 2254-2258
[Abstract]
(1063)
[HTML 0 KB]
[PDF 1341 KB]
(831)
|
|
1364 |
Zhu Jun(朱俊), He Guang-Qiang(何广强), and Zeng Gui-Hua(曾贵华) |
|
|
Security analysis of continuous-variable quantum key distribution scheme |
|
|
|
Chin. Phys. B
2007 Vol.16 (5): 1364-1369
[Abstract]
(1373)
[HTML 1 KB]
[PDF 439 KB]
(714)
|
|
2862 |
Lü Hua(吕桦), Chen Ai-Xi(陈爱喜), and Yan Xu-Dong(闫旭东) |
|
|
Unconditional secure two-way quantum dense key distribution |
|
|
|
Chin. Phys. B
2007 Vol.16 (10): 2862-2866
[Abstract]
(1183)
[HTML 1 KB]
[PDF 132 KB]
(553)
|
First page | Previous Page | Next Page | Last Page | Page 1 of 1 |
|
|