Qiao-yan Wen
#131,206
Most Influential Person Now
Qiao-yan Wen's AcademicInfluence.com Rankings
Qiao-yan Wencomputer-science Degrees
Computer Science
#5778
World Rank
#6099
Historical Rank
Operating Systems
#10
World Rank
#10
Historical Rank
Database
#2909
World Rank
#3034
Historical Rank

Download Badge
Computer Science
Qiao-yan Wen's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science Tsinghua University
Similar Degrees You Can Earn
Why Is Qiao-yan Wen Influential?
(Suggest an Edit or Addition)Qiao-yan Wen's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A Survey on the Security of Blockchain Systems (2017) (1049)
- Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol (2007) (394)
- An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement (2009) (328)
- A simple participant attack on the brádler-dušek protocol (2007) (318)
- An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement (2010) (290)
- Quantum secure direct communication with χ -type entangled states (2008) (281)
- Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state (2010) (256)
- A steganographic method for digital images with four-pixel differencing and modified LSB substitution (2011) (218)
- Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". (2008) (212)
- A watermark strategy for quantum images based on quantum fourier transform (2013) (198)
- Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication (2008) (181)
- Improving the security of multiparty quantum secret sharing against an attack with a fake signal (2006) (180)
- Multiparty quantum key agreement with single particles (2013) (167)
- Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] (2007) (152)
- Flexible quantum private queries based on quantum key distribution. (2011) (144)
- Postprocessing of the Oblivious Key in Quantum Private Query (2014) (144)
- Secure quantum private comparison (2009) (140)
- Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols (2010) (137)
- Cryptanalysis of the arbitrated quantum signature protocols (2011) (132)
- Efficient and provably-secure certificateless short signature scheme from bilinear pairings (2009) (129)
- Finite-key analysis for measurement-device-independent quantum key distribution (2012) (127)
- Efficient quantum private comparison employing single photons and collective detection (2013) (127)
- QKD-based quantum private query without a failure probability (2015) (126)
- Novel multiparty quantum key agreement protocol with GHZ states (2014) (126)
- A Quantum Watermark Protocol (2013) (112)
- An efficient and secure multiparty quantum secret sharing scheme based on single photons (2008) (111)
- Quantum private query: A new kind of practical quantum cryptographic protocol (2019) (110)
- Multiparty quantum secret sharing based on Bell measurement (2009) (110)
- Cryptanalysis and improvement of multiparty quantum secret sharing schemes (2008) (101)
- CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH W STATE (2008) (100)
- Private database queries based on counterfactual quantum key distribution (2013) (99)
- Quantum nonlocality of multipartite orthogonal product states (2016) (99)
- Quantum key agreement with EPR pairs and single-particle measurements (2014) (99)
- A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems (2013) (95)
- Comment on “Multiparty quantum secret sharing of classical messages based on entanglement swapping” (2007) (95)
- Quantum protocol for millionaire problem (2011) (93)
- An image watermarking algorithm based on DWT DCT and SVD (2009) (88)
- Local indistinguishability of orthogonal product states (2015) (87)
- Quantum key distribution without alternative measurements and rotations (2005) (86)
- Consistency of shared reference frames should be reexamined (2008) (85)
- Quantum secure direct communication with cluster states (2010) (84)
- Cryptanalysis of a multi-party quantum key agreement protocol with single particles (2013) (83)
- CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION (2008) (83)
- Improving the security of multiparty quantum secret sharing based on the improved Boström–Felbinger protocol (2008) (83)
- An Anti-Quantum Transaction Authentication Approach in Blockchain (2018) (82)
- Robust variations of the Bennett-Brassard 1984 protocol against collective noise (2009) (81)
- An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network (2012) (78)
- Security of a kind of quantum secret sharing with single photons (2011) (78)
- An improved semantically-secure identity-based signcryption scheme in the standard model (2010) (78)
- A View about Cloud Data Security from Data Life Cycle (2010) (78)
- An Efficient Protocol for the Secure Multi-party Quantum Summation (2010) (75)
- Verifiable Quantum (k,n)-threshold Secret Key Sharing (2011) (75)
- Quantum Private Comparison Using Genuine Four-Particle Entangled States (2012) (73)
- Cryptanalysis and improvement of a certificateless aggregate signature scheme (2015) (73)
- Searchain: Blockchain-based private keyword search in decentralized storage (2017) (73)
- Improved secure quantum sealed-bid auction (2009) (73)
- Arbitrated quantum signature with an untrusted arbitrator (2011) (72)
- Nonlocality of orthogonal product states (2015) (70)
- Local distinguishability of orthogonal quantum states in a 2⊗2⊗2 system (2013) (69)
- Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels (2013) (68)
- Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol (2014) (66)
- Self-tallying quantum anonymous voting (2016) (64)
- Comment on: “Three-party quantum secure direct communication based on GHZ states” [Phys. Lett. A 354 (2006) 67] (2008) (63)
- Quantum anonymous ranking (2014) (63)
- Threshold proxy quantum signature scheme with threshold shared verification (2008) (61)
- Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing (2016) (59)
- Single-Photon Multiparty Quantum Cryptographic Protocols With Collective Detection (2011) (59)
- A Novel Secure Communication Protocol Combining Steganography and Cryptography (2011) (58)
- Quantum secret sharing via local operations and classical communication (2015) (57)
- Discrete-time interacting quantum walks and quantum Hash schemes (2013) (57)
- An Improved Quantum Algorithm for Ridge Regression (2017) (55)
- Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair' (2010) (54)
- Multiparty simultaneous quantum identity authentication with secret sharing (2008) (53)
- Construction of nonlocal multipartite quantum states (2017) (52)
- Quantum algorithm for association rules mining (2015) (52)
- Cryptanalysis and improvement of a secure quantum sealed-bid auction (2009) (52)
- Quantum secure direct communication over the collective amplitude damping channel (2009) (51)
- Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements (2011) (50)
- Quantum circuits for controlled teleportation of two-particle entanglement via a W state (2008) (50)
- Operations on Soft Sets Revisited (2012) (49)
- Eavesdropping and Improvement to Multiparty Quantum Secret Sharing with Collective Eavesdropping-Check (2009) (47)
- Centrally controlled quantum teleportation (2010) (46)
- Dynamic quantum secret sharing (2012) (45)
- Local indistinguishability of multipartite orthogonal product bases (2017) (45)
- Cryptanalysis and improvement of a multi-user quantum key distribution protocol (2010) (44)
- Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states (2013) (44)
- Secure multi-keyword ranked search over encrypted cloud data for multiple data owners (2018) (44)
- A novel remote user authentication and key agreement scheme for mobile client-server environment (2013) (44)
- Threshold quantum secret sharing between multi-party and multi-party (2008) (44)
- Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)] (2011) (42)
- Information leak in Liu et al.’s quantum private comparison and a new protocol (2012) (42)
- An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings (2007) (42)
- THRESHOLD MULTIPARTY QUANTUM-INFORMATION SPLITTING VIA QUANTUM CHANNEL ENCRYPTION (2009) (40)
- On the information-splitting essence of two types of quantum key distribution protocols (2005) (40)
- Fault-tolerant quantum secret sharing against collective noise (2011) (40)
- Comment on “Quantum key distribution for d -level systems with generalized Bell states” (2005) (38)
- Erratum: Arbitrated quantum signature of classical messages against collective amplitude damping noise (Opt. Commun. 283 (2010) 3198–3201) (2010) (38)
- Entanglement as a resource to distinguish orthogonal product states (2016) (37)
- Quantum asymmetric cryptography with symmetric keys (2008) (37)
- Three-particle QKD protocol against a collective noise (2011) (37)
- Multi-party covert communication with steganography and quantum secret sharing (2010) (36)
- Secure authentication of classical messages with decoherence-free states (2009) (35)
- One-way LOCC indistinguishability of maximally entangled states (2014) (35)
- Counterfactual quantum key distribution with high efficiency (2010) (35)
- Quantum Private Comparison Protocol with the Random Rotation (2013) (33)
- An anonymous and efficient remote biometrics user authentication scheme in a multi server environment (2015) (33)
- Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack (2010) (33)
- Some improved results on communication between information systems (2010) (32)
- Quantum threshold group signature (2008) (32)
- Improving the Security of Controlled Quantum Secure Direct Communication by Using Four Particle Cluster States Against an Attack with Fake Entangled Particles (2011) (32)
- Variational quantum algorithm for the Poisson equation (2020) (32)
- Comparing the efficiencies of different detect strategies in the ping-pong protocol (2008) (32)
- Outsourced dynamic provable data possession with batch update for secure cloud storage (2019) (32)
- Fault tolerant quantum secret sharing against collective-amplitude-damping noise (2011) (32)
- Local distinguishability of orthogonal quantum states with multiple copies of 2 ⊗ 2 maximally entangled states (2018) (31)
- Comment on ``Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'' (2005) (31)
- Hybrid chaotic ant swarm optimization (2009) (31)
- A privacy enhanced DNS scheme for the Internet of Things (2011) (30)
- Comment II on "Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers" (3 pages) (2005) (30)
- Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks (2009) (30)
- Locally indistinguishable orthogonal product bases in arbitrary bipartite quantum system (2016) (30)
- Entropy and co-entropy of a covering approximation space (2012) (30)
- Eavesdropping on Multiparty Quantum Secret Sharing Scheme Based on the Phase Shift Operations (2014) (29)
- New Perfect Gaussian Integer Sequences of Period pq (2013) (29)
- Distinguishing maximally entangled states by one-way local operations and classical communication (2015) (28)
- Local discrimination of four or more maximally entangled states (2015) (28)
- Asymptotic quantum algorithm for the Toeplitz systems (2016) (28)
- Deterministic Secure Quantum Communication with Collective Detection Using Single Photons (2012) (27)
- Comment on “Controlled DSQC using five-qubit entangled states and two-step security test” (2009) (27)
- Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems (2014) (27)
- Characterizing unextendible product bases in qutrit-ququad system (2015) (27)
- Design of Security Solution to Mobile Cloud Storage (2012) (27)
- Comment on: “Efficient high-capacity quantum secret sharing with two-photon entanglement” [Phys. Lett. A 372 (2008) 1957] (2009) (26)
- Information-theoretic measures associated with rough set approximations (2011) (26)
- MULTIPARTY CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH PHASE ENCRYPTION (2011) (26)
- Probabilistic Soft Sets (2010) (26)
- Practical quantum all-or-nothing oblivious transfer protocol (2014) (25)
- Perfect quantum multiple-unicast network coding protocol (2018) (25)
- A quantum secret-sharing protocol with fairness (2014) (25)
- An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption (2019) (24)
- An Improved Certificateless Signcryption in the Standard Model (2015) (24)
- A novel pairing-free certificateless authenticated key agreement protocol with provable security (2013) (24)
- An external attack on the Brádler–Dušek protocol (2007) (24)
- Homomorphisms between fuzzy information systems revisited (2010) (23)
- QUANTUM CIRCUITS FOR PROBABILISTIC ENTANGLEMENT TELEPORTATION VIA A PARTIALLY ENTANGLED PAIR (2007) (23)
- Cheat sensitive quantum bit commitment via pre- and post-selected quantum states (2014) (23)
- An Efficient Certificateless Aggregate Signature Scheme Without Pairings for Healthcare Wireless Sensor Network (2019) (22)
- Error Tolerance Bound in QKD-Based Quantum Private Query (2020) (22)
- Analysis of the two-particle controlled interacting quantum walks (2013) (22)
- Improving the security of secure quantum telephone against an attack with fake particles and local operations (2009) (22)
- Economical quantum anonymous transmissions (2010) (21)
- Local discrimination of qudit lattice states via commutativity (2015) (21)
- Cryptanalysis and improvement of a DSQC using four-particle entangled state and entanglement swapping (2009) (21)
- Generic quantum walks with memory on regular graphs (2015) (20)
- Comment on “Secure multiparty computation with a dishonest majority via quantum means” (2011) (20)
- Constructing locally indistinguishable orthogonal product bases in an $m \otimes n$ system (2015) (20)
- A TWO-STEP CHANNEL-ENCRYPTING QUANTUM KEY DISTRIBUTION PROTOCOL (2010) (20)
- An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks (2013) (20)
- Constructions of resilient rotation symmetric boolean functions on given number of variables (2014) (20)
- An efficient quantum secret sharing protocol with orthogonal product states (2007) (19)
- Certificateless proxy multi-signature (2014) (19)
- Classification of locally distinguishable and indistinguishable sets of maximally entangled states (2016) (18)
- QUANTUM KEY DISTRIBUTION BY CONSTRUCTING NONORTHOGONAL STATES WITH BELL STATES (2010) (18)
- A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function (2012) (18)
- A new provably secure certificateless signature scheme for Internet of Things (2020) (18)
- Round-robin differential-phase-shift quantum key distribution with a passive decoy state method (2017) (18)
- Quasi-secure quantum dialogue using single photons (2007) (17)
- Linear monogamy of entanglement in three-qubit systems (2015) (17)
- Eavesdropping and Improvement to Multiparty Quantum Secret Sharing with Collective Eavesdropping-Check (2012) (17)
- A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service Based on the Internet of Things (2012) (16)
- Local distinguishability of orthogonal quantum states with no more than one ebit of entanglement (2019) (16)
- Improving the quantum secure direct communication by entangled qutrits and entanglement swapping against intercept-and-resend attack (2010) (16)
- Security of quantum secret sharing with two-particle entanglement against individual attacks (2009) (15)
- Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System (2017) (15)
- Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks (2014) (15)
- Quantum Algorithms for Anomaly Detection Using Amplitude Estimation (2021) (15)
- Preserving Sensor Location Privacy in Internet of Things (2012) (15)
- One-time pads cannot be used to improve the efficiency of quantum communication (2006) (15)
- An Authenticated Group Key Transfer Protocol Based on Secret Sharing (2012) (15)
- Private Keyword-Search for Database Systems Against Insider Attacks (2017) (15)
- Online/Offline Ciphertext Retrieval on Resource Constrained Devices (2016) (15)
- Improved Secure Multiparty Computation with a Dishonest Majority via Quantum Means (2013) (14)
- A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption (2015) (14)
- Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources (2015) (14)
- Data Security Accessing for HDFS Based on Attribute-Group in Cloud Computing (2014) (14)
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing (2017) (14)
- Certificateless multi-proxy signature (2011) (14)
- Quantum Steganography with High Efficiency with Noisy Depolarizing Channels (2013) (14)
- A lattice-based signcryption scheme without random oracles (2014) (14)
- An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems (2013) (14)
- An efficient blind filter: Location privacy protection and the access control in FinTech (2019) (14)
- General existence of locally distinguishable maximally entangled states only with two-way classical communication (2016) (13)
- A supplement to Liu et al.'s certificateless signcryption scheme in the standard model (2010) (13)
- Improving the Adaptive Steganographic Methods Based on Modulus Function (2013) (13)
- Novel quantum circuit implementation of Advanced Encryption Standard with low costs (2022) (13)
- An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs (2013) (13)
- Chaotic ant swarm optimization with passive congregation (2012) (13)
- Improved quantum algorithm for A-optimal projection (2020) (13)
- A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices (2013) (13)
- Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things (2014) (13)
- Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology (2011) (12)
- A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction (2012) (12)
- Choice of measurement as the secret (2014) (12)
- Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels (2012) (12)
- High-efficient quantum key distribution based on hybrid entanglement (2011) (12)
- Finite-key analysis for quantum key distribution with decoy states (2011) (12)
- Adaptively Secure Broadcast Encryption With Constant Ciphertexts (2016) (12)
- On the security of a certificateless aggregate signature scheme (2013) (11)
- A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System (2020) (11)
- A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings (2018) (11)
- Quantum algorithms for ridge regression (2017) (11)
- Cryptanalysis and improvement of a certificateless encryption scheme in the standard model (2014) (11)
- Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud (2017) (11)
- Composite control for protecting two nonorthogonal qubit states against decoherence (2017) (11)
- Security of Semi-Device-Independent Random Number Expansion Protocols (2015) (11)
- An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems (2015) (11)
- A Single Sign-On Scheme for Cross Domain Web Applications Using Identity-Based Cryptography (2010) (11)
- Semi-device-independent randomness expansion with partially free random sources using 3 →1 quantum random access code (2016) (10)
- Local distinguishability of maximally entangled states in canonical form (2015) (10)
- A secure mobile RFID architecture for the Internet of Things (2010) (10)
- Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation (2014) (10)
- Object-Oriented Quantum Cryptography Simulation Model (2007) (10)
- A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption (2016) (10)
- Linear Complexity of Generalized Cyclotomic Quaternary Sequences with Period pq (2014) (10)
- Effects of measurement dependence on generalized Clauser-Horne-Shimony-Holt Bell test in the single-run and multiple-run scenarios (2016) (10)
- Quantum position verification in bounded-attack-frequency model (2016) (10)
- Passive RFID-supported source location privacy preservation against global eavesdroppers in WSN (2013) (9)
- Embedding in Two Least Significant Bits with Wet Paper Coding (2008) (9)
- Data Fitting Via Chaotic Ant Swarm (2006) (9)
- Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization (2014) (9)
- Quantum algorithm for Neighborhood Preserving Embedding (2021) (9)
- Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing (2022) (9)
- Distributed Steganography (2011) (9)
- Remote Preparation of a Six-Particle Entangled Cluster-Type State (2012) (9)
- Public Key Encryption with Authorized Keyword Search (2016) (9)
- Minimal number of runs and the sequential scheme for local discrimination between special unitary operations (2016) (9)
- Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on pq Variables (2013) (9)
- Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services (2020) (9)
- Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage (2020) (9)
- Semi-device-independent randomness expansion with partially free random sources (2015) (9)
- DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps (2020) (9)
- Semi-loss-tolerant strong coin flipping protocol using EPR pairs (2011) (8)
- A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method (2018) (8)
- Minimum best success probability by classical strategies for quantum pseudo-telepathy (2014) (8)
- New Construction of Symmetric Orthogonal Arrays of Strength t (2013) (8)
- Splitting a quantum secret without the assistance of entanglements (2012) (8)
- A cloud-based system for enhancing security of Android devices (2012) (8)
- QUANTUM KEY DISTRIBUTION BASED ON ENTANGLEMENT SWAPPING BETWEEN TWO BELL STATES (2006) (8)
- A lattice-based digital signature from the Ring-LWE (2012) (8)
- A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation (2020) (8)
- GENERAL: Teleportation attack on the QSDC protocol with a random basis and order (2008) (8)
- Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme (2008) (8)
- General bounds for quantum discord and discord distance (2014) (8)
- Analysis and Improvement of ‘Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme’ (2015) (8)
- Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud (2022) (8)
- A Unified Definition of Consistent Functions (2014) (7)
- Secure-channel free keyword search with authorization in manager-centric databases (2017) (7)
- An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks (2013) (7)
- Controlling the key by choosing the detection bits in quantum cryptographic protocols (2015) (7)
- A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems (2015) (7)
- Cryptanalysis and improvement of a certificateless partially blind signature (2015) (7)
- A biometric-based Password Authentication with key Exchange Scheme using Mobile Device for Multi-Server Environment (2015) (7)
- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption (2005) (7)
- Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures (2019) (7)
- A general method for constructing unitary operations for protocols with collective detection and new QKD protocols against collective noise (2012) (7)
- A note on communicating between information systems based on including degrees (2010) (7)
- Determination of locally perfect discrimination for two-qubit unitary operations (2016) (7)
- Using entanglement more efficiently in distinguishing orthogonal product states by LOCC (2019) (7)
- Modified chaotic ant swarm to function optimization (2009) (7)
- Research and design of the PMI-based access control model for OpenVPN (2010) (7)
- Multipartite entanglement indicators based on monogamy relations of n-qubit symmetric states (2016) (6)
- Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources (2017) (6)
- Self-Testing of Symmetric Three-Qubit States (2019) (6)
- Perfect discrimination of projective measurements with the rank of all projectors being one (2015) (6)
- A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks (2012) (6)
- Participant Attack and Improvement to Multiparty Quantum Secret Sharing Based on GHZ States (2013) (6)
- A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications (2016) (6)
- Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System (2019) (6)
- Improving the security of quantum exam against cheating (2006) (6)
- Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow (2018) (6)
- Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel (2013) (6)
- Generating natural adversarial examples with universal perturbations for text classification (2021) (6)
- New Constructions of ZCZ Sequence Set with Large Family Size (2007) (6)
- Quantum algorithm for logistic regression (2019) (6)
- Is quantum key distribution suitable for steganography? (2013) (6)
- Self-testing using only marginal information (2018) (5)
- Privacy-Preserving Linear Region Search Service (2021) (5)
- PERFECT TELEPORTATION, SUPERDENSE CODING VIA A KIND OF W-CLASS STATE (2010) (5)
- Improved certificateless multi-proxy signature (2012) (5)
- Enhanced No-Go Theorem for Quantum Position Verification (2013) (5)
- Design and implementation of proxy-based SSO and security audit system for remote desktop access (2010) (5)
- Novel Efficient Certificateless Blind Signature Schemes (2009) (5)
- An efficient anonymous batch authenticated and key agreement scheme using self-certified public keys in VANETs (2013) (5)
- A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion (2018) (5)
- Entanglement Split:Comment on ``Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers'' [Phys. Rev. A 67, 044302 (2003)] (2006) (5)
- Rough approximations based on bisimulations (2017) (5)
- Construction of nonbinary quantum cyclic codes by using graph method (2007) (5)
- Quantum secret sharing between multiparty and multiparty with entanglement swapping (2008) (5)
- A Fault Detection Method for Wireless Sensor Networks Based on Credible Sensor Nodes Set (2012) (5)
- Bounds for coherence of quantum superpositions in high dimension (2017) (5)
- Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds (2021) (5)
- Local discrimination scheme for some unitary operations (2016) (5)
- A New Protocol for Quantum Private Query Against Joint-Measurement Attack (2019) (5)
- Offline Password Guessing Attacks on Smart-Card-Based Remote User Authentication Schemes (2016) (5)
- Identity Based Proxy Re-encryption Scheme under LWE (2017) (5)
- Block-encoding-based quantum algorithm for linear systems with displacement structures (2019) (5)
- A New Efficient ID-Based Strong Designated Verifier Signature Scheme (2010) (5)
- Pairing based elliptic curve encryption scheme with hybrid problems in Smart House (2013) (5)
- GENERAL: A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol (2008) (4)
- Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage (2020) (4)
- An authorization model for multi-tenancy services in cloud (2012) (4)
- Analytic robustness bound for self-testing of the singlet with two binary measurements (2019) (4)
- An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems (2018) (4)
- Comments on “Provable Multicopy Dynamic Data Possession in Cloud Computing Systems” (2020) (4)
- Publisher's Note: Generic quantum walks with memory on regular graphs [Phys. Rev. A 93, 042323 (2016)] (2016) (4)
- On the construction of multi-output Boolean functions with optimal algebraic immunity (2012) (4)
- Certification of three black boxes with unsharp measurements using 3 → 1 sequential quantum random access codes (2021) (4)
- Security analysis of two certificateless short signature schemes (2014) (4)
- A Digital Signature Schemes Without Using One-way Hash and Message Redundancy and Its Application on Key Agreement (2007) (4)
- The Properties of the FCSR-Based Self-Shrinking Sequence (2013) (4)
- Quantum mean centering for block-encoding-based quantum algorithm (2022) (4)
- Protecting Sensor Location Privacy against Adversaries in Wireless Sensor Networks (2013) (4)
- Reduced gap between observed and certified randomness for semi-device-independent protocols (2015) (4)
- The Research in Improving the Quality of DW Data: The Job-Scheduling and Checking Based Program in Upgrading DW Performance (2009) (4)
- A Secure and Efficient Certificateless Short Signature Schema (2013) (4)
- On the Linear Complexity of a Class of Quaternary Sequences with Low Autocorrelation (2013) (4)
- An ID-Based Watermarking Scheme for Java Programs (2006) (4)
- Comment on “Eavesdropping on the improved three-party quantum secret sharing protocol” (2011) (4)
- Smart card-based authenticated key exchange protocol with CAPTCHA for wireless mobile network (2010) (4)
- New General Constructions of LCZ Sequence Sets Based on Interleaving Technique and Affine Transformations (2010) (4)
- Quantum Conditional Random Field (2019) (3)
- Trusted Mobile Client for Document Security in Mobile Office Automation (2011) (3)
- Determination of stabilizer states (2015) (3)
- Linear Complexity of Generalized Cyclotomic Binary Sequences with Period 2pm+1qn+1 (2015) (3)
- Bound on local unambiguous discrimination between multipartite quantum states (2015) (3)
- Efficient Fair Contract Signing Protocol from Bilinear Pairings (2008) (3)
- Coherence of Superpositions (2016) (3)
- Vulnerability Detection on Android Apps–Inspired by Case Study on Vulnerability Related With Web Functions (2020) (3)
- An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs (2008) (3)
- MF-PDP: Multi-function provable data possession scheme in cloud computing (2014) (3)
- Security flaw of counterfactual quantum cryptography in practical setting (2013) (3)
- Determination of W states equivalent under stochastic local operations and classical communication by their bipartite reduced density matrices with tree form (2014) (3)
- Attribute-based fuzzy identity access control in multicloud computing environments (2018) (3)
- Constructions of Almost Resilient Functions (2005) (3)
- New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services (2020) (3)
- Anonymous quantum communications using the quantum one-time pad (2014) (3)
- A revocation scheme for the cloud computing environment (2011) (3)
- Authenticated public key broadcast encryption with short ciphertexts (2019) (3)
- A Honeynet-Based Firewall Scheme with Initiative Security Strategies (2009) (3)
- Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves (2008) (3)
- An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications (2020) (3)
- Integer Programming via Chaotic Ant Swarm (2007) (3)
- Secure and Efficient Certificateless Signature and Blind Signature Scheme from Pairings (2013) (3)
- Probabilistic teleportation of a two-particle entangled state via a partially entangled pair (2006) (3)
- Necessary and sufficient conditions on n-qudit state for perfect teleportation of an arbitrary single qudit state (2009) (3)
- Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security (2018) (3)
- Results on Almost Resilient Functions (2006) (3)
- Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks (2021) (3)
- GLS: New class of generalized Legendre sequences with optimal arithmetic cross-correlation (2013) (3)
- Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation (2019) (3)
- Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search (2019) (2)
- Determination of Dicke states equivalent under stochastic local operations and classical communication (2015) (2)
- An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks (2015) (2)
- A Secure Online Treatment Blockchain Service (2020) (2)
- Threshold quantum cryptograph based on Grover's algorithm (2006) (2)
- Delegation of Decryption Rights With Revocability From Learning With Errors (2018) (2)
- Constructing Opaque Predicates for Java Programs (2006) (2)
- Constructions of Quantum Boolean Functions (2010) (2)
- A quantum key distribution and identification protocol based on entanglement swapping (2004) (2)
- A Secure and Efficient Certificateless Short Signature Scheme (2013) (2)
- A key agreement protocol based-on object identifier for Internet of Things☆ (2011) (2)
- Provably Secure Blind ID-Based Strong Designated Verifier Signature Scheme (2007) (2)
- Providing Location Privacy against a Global Adversary in Wireless Sensor Networks (2013) (2)
- Forward privacy multikeyword ranked search over encrypted database (2022) (2)
- Device-independent verification of Einstein-Podolsky-Rosen steering (2019) (2)
- A protect solution for data security in mobile cloud storage (2013) (2)
- A quantum algorithm for solving eigenproblem of the Laplacian matrix of a fully connected graph (2022) (2)
- Bayesian machine learning for Boltzmann machine in quantum-enhanced feature spaces (2019) (2)
- Analysis and Improvement of SPRINT Algorithm Based on Hadoop (2014) (2)
- Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures (2018) (2)
- Secure Files Management System in Intranet (2008) (2)
- Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage (2022) (2)
- Practical Attribute-Based Conjunctive Keyword Search Scheme (2019) (2)
- A Novel Protocol-Feature Attack against Tor's Hidden Service (2016) (2)
- Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture (2019) (2)
- A Robust Authentication Scheme for Multiple Servers Architecture (2019) (2)
- Practical covert quantum key distribution with decoy-state method (2019) (2)
- A Secure Protocol for Point-Segment Position Problem (2010) (2)
- A unified view of consistent functions (2017) (2)
- Data Storage Scheme of Sensor Network Based on HDFS (2014) (2)
- 2-Adic Complexity of Self-Shrinking Sequence (2011) (2)
- Construction of a class of quantum Boolean functions based on the Hadamard matrix (2015) (1)
- A constant rounds group key agreement protocol without using hash functions (2009) (1)
- A Security Improved Protocol for Wireless Sensor Networks Based On Public Key Certificate (2011) (1)
- A Fault Tree based Microservice Reliability Evaluation Model (2019) (1)
- Information leak in Liu et al.’s quantum private comparison and a new protocol (2012) (1)
- A lattice-based multi-receiver signcryption scheme for point to multi-point communication (2013) (1)
- An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks (2012) (1)
- Transparent Discovery of Hidden Service (2016) (1)
- Multi-watermarking scheme for group users based on Visual Cryptography (2005) (1)
- Linear complexity of generalised cyclotomic quaternary sequences of length 2p m+1 q n+1 (2016) (1)
- The randomness in 2$$\rightarrow $$→1 quantum random access code without a shared reference frame (2018) (1)
- Efficient ID-based proxy blind signature scheme (2006) (1)
- Construction of Boolean functions with optimal algebraic immunity based on the maximal linear orthomorphic permutations (2011) (1)
- A Multi-Function Provable Data Possession Scheme in Cloud Computing (2014) (1)
- Teleportation of an unknown two-particle entangled state via an asymmetric three-particle entanglement state (2008) (1)
- Provably secure and efficient certificateless signature in the standard model (2015) (1)
- An approach for secure-communication between XEN virtual machines (2012) (1)
- Probabilistic Teleportation of an Arbitrary d-Level n-Particle (n-Qudit) State (2009) (1)
- Constructions of Binary Sequences with Almost Optimal Autocorrelation Magnitude: Constructions of Binary Sequences with Almost Optimal Autocorrelation Magnitude (2011) (1)
- A Productive Time Length-Based Method for Multi-tenancy-Oriented Service Usage Metering and Billing (2011) (1)
- Analysis on anonymity of P2P anonymous communication system (2015) (1)
- New Constructions of Binary Sequences with Good Autocorrelation Based on Interleaving Technique (2011) (1)
- Affine braid groups: a better platform than braid groups for cryptology? (2011) (1)
- On the Security of a Certificateless Signature Scheme (2014) (1)
- Further Constructions of Almost Resilient Functions (2005) (1)
- Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity (2019) (1)
- A Light-Weight Rainbow Signature Scheme for WSN (2012) (1)
- On the security of a certi cateless signature scheme in the standard model (2013) (1)
- A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings (2020) (1)
- New Constructions of Large Binary Sequences Family with Low Correlation (2006) (1)
- Side information -driven quantum composite control for protecting a qubit (2019) (1)
- Implementing block-encoding with a decomposition of linear combination of unitaries (2019) (1)
- A Single Sign-On Scheme for Cross Domain Web Applications Based on SOA * (2012) (1)
- Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing (2011) (1)
- Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols (2013) (1)
- Fair loss-tolerant and quantum-memory-loss-sensitive SCF protocol based on EPR pair (2011) (1)
- New Solution for Small File Storage of Hadoop Based on Prefetch Mechanism (2014) (1)
- CRYPTANALYSIS OF THE QSDC PROTOCOL WITHOUT USING PERFECT QUANTUM CHANNEL (2012) (1)
- Key Management Scheme Based on Identity and Dual Cluster Heads for WSN (2013) (1)
- On Bounding Entangling Rates and Mixing Rates in Some Special Cases (2016) (1)
- A note on "communicating between information systems" (2010) (1)
- Construction and Count on Linear Orthomorphic Permutations Based on m Sequence (2011) (1)
- A Fuzzy Identity-Based Signcryption Scheme from Lattices (2014) (1)
- Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement (2012) (1)
- An Sub-Signature Verification Protocol Using (t, k) Threshold RSA Signature without Trusted Center (2009) (1)
- Quantum sharing of classical secret based on local operations (2005) (1)
- Enhancing Sensor Location Privacy in Wireless Sensor Networks (2013) (1)
- The design of the cloud mobile OA system (2012) (1)
- On the construction of odd-variable boolean functions with optimal algebraic immunity (2013) (1)
- Robustness self-testing of states and measurements in the prepare-and-measure scenario with $3\to 1$ random access code (2019) (1)
- A General Construction of ZCZ Sequence Set with Large Family Size and Long Period (2011) (1)
- Quantum Algorithm for the Toeplitz Systems (2016) (1)
- Improving the security of multiparty quantum secret sharing based on entanglement swapping against participant attack (2006) (0)
- Quantum secret sharing protocols with high efficiency (2006) (0)
- Structures and cryptographic properties of single cycle T-functions (2009) (0)
- A Latticed-Based Public Key Encryption with KDM Security from R-LWE (2012) (0)
- Quantum <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e782" altimg="si67.svg"><mml:mi>k</mml:mi></mml:math>-fold cross-validation for nearest neighbor classification algorithm (2022) (0)
- A verifiable multi-secret sharing scheme based on LUC cryptosystem (2011) (0)
- Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System (2019) (0)
- Comment on "Quantum key distribution via quantum encryption" (2005) (0)
- A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model (2011) (0)
- The critical detection efficiency for closing the detection loophole of some modified Bell inequalities (2019) (0)
- A smart card-based secure software distribution scheme for mobile application market (2012) (0)
- Cryptanalysis of some client-to-client password-authenticated key exchange protocols (2010) (0)
- The general theory of three-party quantum secret sharing protocols over phase-damping channels (2013) (0)
- Comment on "A Random Quantum Key Distribution Achieved by Using Bell States" (2005) (0)
- Research on Mobile Electronically Published Materials Protection (2011) (0)
- Adaptively secure broadcast encryption with authenticated content distributors (2020) (0)
- New families of P-ary sequences with low correlation and large linear span (2007) (0)
- qu an tph ] 1 8 M ar 2 01 5 Determination of stabilizer states (2018) (0)
- Analysis on Operating Mechanism of SecurityKISS (2012) (0)
- Cryptanalysis of a Certificateless Partially Blind Signature (2014) (0)
- Error Oracle Attacks on Several Modes of Operation (2005) (0)
- Construction and counting of 1relisent rotation systemic Boolean functions on pq variables (2013) (0)
- Quantum Private Comparison Protocol with the Random Rotation (2013) (0)
- A key exchange scheme based-on product code and performance simulation (2011) (0)
- Effects of measurement dependence on 1-parameter family of Bell tests (2021) (0)
- Notice of RetractionA generalized forward-secure proxy blind signature scheme (2011) (0)
- Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool (2018) (0)
- A General Construction of Low Correlation Zone Sequence Sets Based on Finite Fields and Balanced Function (2012) (0)
- Provably Secure Cross-Realm Client-To-Client Password-Authenticated Key Exchange Protocol (2012) (0)
- Controlled teleportation of multi-particle partially entangled state via a W state (2008) (0)
- An Architecture of Secure Searchable Cloud Store (2013) (0)
- Related-Mode Attacks on PMAC (2012) (0)
- A propagation model of passive social network worm (2012) (0)
- Analysis of the Dynamic ID-Based Remote User Authentication Schemes Using Smart Card for Multi-Server Environments (2014) (0)
- Genuine Einstein-Podolsky-Rosen steering of generalized three-qubit states via unsharp measurements (2022) (0)
- Multiparty quantum key agreement with single (2015) (0)
- A constant-round perfect parallel coin-tossing protocol (2010) (0)
- Data Integrity and Availability in Cloud Computing Based on Megastore (2013) (0)
- A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation (2012) (0)
- A Proxy-Based Data Security Solution in Mobile Cloud (2015) (0)
- Node information in WSN from the business perspective (2012) (0)
- Semi-Device-Independent Randomness Expansion with Weak Random Sources (2015) (0)
- FAPA: Transferable Adversarial Attacks Based on Foreground Attention (2022) (0)
- A Novel Reversible Data Hiding Based on the Prediction Error Image (2009) (0)
- An architecture for dynamic management and monitoring of virtual machines (2012) (0)
- REEXAMINING THE SECURITY OF THE RECONSTRUCTION PHASE OF THE HILLERY-BUZĚK-BERTHIAUME QUANTUM SECRET-SHARING PROTOCOL (2009) (0)
- GENERAL: A New Solution to Detectable Byzantine Agreement Problem (2009) (0)
- A Improved Certificate-Based Security Protocol for Wireless Sensor Networks (2012) (0)
- LPS-ORAM: Perfectly Secure Oblivious RAM with Logarithmic Bandwidth Overhead (2022) (0)
- A Secure Cloud Computing Scaling Model (2013) (0)
- Timing and hamming weight attacks on minimal cost encryption scheme (2009) (0)
- Ju n 20 19 Quantum algorithm for logistic regression (2019) (0)
- Secure and Differentiated Fog-Assisted Data Access for Internet of Things (2021) (0)
- A privacy-preserving authenticated key agreement protocol with smart cards for mobile emergency services (2017) (0)
- New record in the number of qubits for a quantum implementation of AES (2023) (0)
- Quantum Attacks on Beyond-Birthday-Bound MACs (2023) (0)
- D ec 2 01 8 Self-testing using only marginal information (2018) (0)
- Privacy Protection Data Retrieval Scheme with Inverted Index for IoT based on Blockchain (2021) (0)
- AOP-Based J2EE Source Code Protection (2007) (0)
- On the 2-Adic Complexity of Periodic Binary Sequences (2012) (0)
- Ju l 2 01 9 Self-testing of symmetric three-qubit states (2019) (0)
- Improved Adaptive-Edge method by changing the readjusting phase (2010) (0)
- A rORAM scheme with logarithmic bandwidth and logarithmic locality (2022) (0)
- Construction of Odd-Variable Boolean Functions with Optimum Algebraic Immunity (2013) (0)
- Semi-Loss-Tolerant SCF Protocol Based on EPR Pair (2011) (0)
- Study on the Technology of the Secure Computation in the Different Adversarial Models (2011) (0)
- ON THE AUTOMORPHISM GROUPS OF A FAMILY OF BINARY QUANTUM ERROR-CORRECTING CODES (2006) (0)
- Two fast algorithms for computing point scalar multiplications on elliptic curves (2004) (0)
- New Constructions of Binary Sequences with Optimal Autocorrelation Magnitude Based on Interleaving Technique (2011) (0)
- A Pseudo-Route Based Method for Illegal External Link Detection (2009) (0)
- A general two-party bi-input private function evaluation protocol (2015) (0)
- qu an tph ] 2 4 M ay 2 01 6 Coherence of Superpositions (2021) (0)
- New Constructions of ZCZ Sequence Sets Based on Affine Transformations (2009) (0)
- Necessary and sufficient conditions for positive semidefinite quantum mutual information matrices (2014) (0)
- A Quantum Algorithm for Solving Eigenproblem of the Laplacian Matrix of a Fully Connected Weighted Graph (2022) (0)
- A Novel Solution to Document Protection on Mobile Platform (2012) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Qiao-yan Wen?
Qiao-yan Wen is affiliated with the following schools: