-
121
Long-time error-mitigating simulation of open quantum systems on near term quantum computers
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
122
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
123
Efficient fault-tolerant implementations of non-Clifford gates with reconfigurable atom arrays
Published 2024-12-01“…npj Quantum Information…”
Get full text
Article -
124
Remote cooling of spin-ensembles through a spin-mechanical hybrid interface
Published 2025-02-01“…npj Quantum Information…”
Get full text
Article -
125
Experimental study on designing smart antenna sensor networks and modelling management energy consumption for intelligent systems of internet of medical things
Published 2025-01-01“…Journal of Information and Telecommunication…”
Get full text
Article -
126
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
127
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
128
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
129
High-dimensional coherent one-way quantum key distribution
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
130
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
131
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01“…IET Information Security…”
Get full text
Article -
132
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
133
Further constructions of bent functions and their duals
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
134
Low-error encoder for time-bin and decoy states for quantum key distribution
Published 2025-02-01“…npj Quantum Information…”
Get full text
Article -
135
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
136
Trade-offs encountered in traditional mobility enhancement techniques applied to contact-controlled thin film transistors
Published 2025-01-01“…Journal of Information Display…”
Get full text
Article -
137
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
138
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
139
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
140
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…IET Information Security…”
Get full text
Article