关注
Jason Lin
标题
引用次数
引用次数
年份
New Quantum Private Comparison Protocol Using EPR Pairs
HY Tseng, J Lin, T Hwang
Quantum Information Processing 11 (2), 373-384, 2012
2202012
Intercept-Resend Attacks on Chen et al.'s Quantum Private Comparison Protocol and the Improvements
J Lin, HY Tseng, T Hwang
Optics Communications 284 (9), 2412-2414, 2011
852011
New Circular Quantum Secret Sharing for Remote Agents
J Lin, T Hwang
Quantum Information Processing 12 (1), 685-697, 2013
712013
An Enhancement on Shi et al.'s Multiparty Quantum Secret Sharing Protocol
J Lin, T Hwang
Optics Communications 284 (5), 1468-1471, 2011
482011
Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements
J Lin, CW Yang, CW Tsai, T Hwang
International Journal of Theoretical Physics 52 (1), 156-162, 2013
452013
Quantum Private Comparison of Equality Protocol without a Third Party
J Lin, CW Yang, T Hwang
Quantum Information Processing 13 (2), 239-247, 2014
442014
Quantum Key Distribution Networks: Challenges and Future Research Issues in Security
CW Tsai, CW Yang, J Lin, YC Chang, RS Chang
Applied Sciences 11 (9), 3767, 2021
402021
Bell State Entanglement Swappings over Collective Noises and Their Applications on Quantum Cryptography
J Lin, T Hwang
Quantum Information Processing 12 (2), 1089-1107, 2013
302013
Multiparty Mediated Quantum Secret Sharing Protocol
CW Tsai, CW Yang, J Lin
Quantum Information Processing 21 (2), 1-17, 2022
182022
Cryptanalysis and Improvement in Semi-quantum Private Comparison Based on Bell States
CW Tsai, J Lin, CW Yang
Quantum Information Processing 20 (3), 1-14, 2021
152021
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix
CN Lin, CC Chang, WB Lee, J Lin
International Conference on Intelligent Information Hiding and Multimedia …, 2009
132009
Feature Extraction of Anomaly Electricity Usage Behavior in Residence Using Autoencoder
CW Tsai, KC Chiang, HY Hsieh, CW Yang, J Lin, YC Chang
Electronics 11 (9), 1450, 2022
122022
Extraction of Math Expressions from PDF Documents based on Unsupervised Modeling of Fonts
Z Wang, D Beyette, J Lin, JC Liu
International Conference on Document Analysis and Recognition, 381-386, 2019
122019
Prediction of Mathematical Expression Declarations Based on Spatial, Semantic, and Syntactic Analysis
J Lin, X Wang, Z Wang, D Beyette, JC Liu
Proceedings of the ACM Symposium on Document Engineering, 2019
102019
Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack
HW Wang, CW Tsai, J Lin, YY Huang, CW Yang
Mathematics 10 (8), 1241, 2022
92022
A Color Image Authentication Scheme with Grayscale Invariance
W Hong, J Chen, PS Chang, J Wu, TS Chen, J Lin
IEEE Access 9, 6522-6535, 2020
92020
Authenticated Semi-Quantum Key Distribution Protocol Based on W States
HW Wang, CW Tsai, J Lin, CW Yang
Sensors 22 (13), 4998, 2022
82022
Cryptanalysis and Improvement of a Controlled Quantum Secure Direct Communication with Authentication Protocol Based on Five-Particle Cluster State
CW Yang, J Lin, KL Wang, CW Tsai
Quantum Information Processing 22 (5), 196, 2023
72023
Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States
CW Yang, J Lin, CW Tsai, CL Cheng
Entropy 24 (10), 1408, 2022
62022
Quantifying Tactical Risk: A Framework for Statistical Classification Using MECH
X Wang, S George, J Lin, JC Liu
International Conference on Social Computing, Behavioral-Cultural Modeling …, 2015
62015
系统目前无法执行此操作,请稍后再试。
文章 1–20