Author of the publication

SKC-CCCO: an encryption algorithm for quantum group signature.

, , , , , , and . Quantum Inf. Process., 21 (9): 328 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-automated image processing system for micro- to macro-scale analysis of immunohistopathology: application to ischemic brain tissue., , , and . Comput. Methods Programs Biomed., 78 (1): 75-86 (2005)Dynamic estimation of optical flow field using objective functions., , and . Image Vis. Comput., 7 (4): 259-267 (1989)Pixel-based statistical analysis by a 3D clustering approach: Application to autoradiographic images., , , , and . Comput. Methods Programs Biomed., 83 (1): 18-28 (2006)A high-accuracy and lightweight detector based on a graph convolution network for strip surface defect detection., , , , , , , , and . Adv. Eng. Informatics, (2024)Automatic product conceptual optimization based on object-oriented performance components and graph grammars., and . Concurrent Engineering: R&A, 23 (2): 145-165 (2015)A micro visual servo system for biological cell manipulation: overview and new developments., , , , and . ICARCV, page 429-434. IEEE, (2002)Fundamental measures of the complex SoS capability oriented to the planning and decision-making of engineering construction., , , , and . SoSE, page 19-24. IEEE, (2014)Adaptive wavelet thresholding for time varying SNR signal denoising., , , and . ISCAS (4), page 827-829. IEEE, (2002)Practice makes perfect: An adaptive active learning framework for image classification., , , , and . Neurocomputing, (2016)Applications of schema theory in information security teaching., and . ICDIP, volume 8334 of SPIE Proceedings, page 83342S. SPIE, (2012)