Huawang Qin

Orcid: 0000-0003-4564-6836

According to our database1, Huawang Qin authored at least 18 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A multi-expose fusion image dehazing based on scene depth information.
Vis. Comput., October, 2023

2020
Quantum (<i>t</i>, <i>n</i>) threshold group signature based on Bell state.
Quantum Inf. Process., 2020

2019
Efficient quantum multi-proxy signature.
Quantum Inf. Process., 2019

Quantum secret sharing by using Fourier transform on orbital angular momentum.
IET Inf. Secur., 2019

2018
Establishing rational networking using the DL04 quantum secure direct communication protocol.
Quantum Inf. Process., 2018

Multi-dimensional quantum state sharing based on quantum Fourier transform.
Quantum Inf. Process., 2018

Threshold quantum state sharing based on entanglement swapping.
Quantum Inf. Process., 2018

High-capacity quantum secret sharing based on orbital angular momentum.
Quantum Inf. Comput., 2018

2017
Dynamic quantum secret sharing by using <i>d</i>-dimensional GHZ state.
Quantum Inf. Process., 2017

2016
Efficient quantum secret sharing.
Quantum Inf. Process., 2016

<i>d</i>-Dimensional quantum state sharing with adversary structure.
Quantum Inf. Process., 2016

Verifiable (t, n) threshold quantum secret sharing using d-dimensional Bell state.
Inf. Process. Lett., 2016

2015
(<i>t</i>, <i>n</i>) Threshold quantum secret sharing using the phase shift operation.
Quantum Inf. Process., 2015

Proactive quantum secret sharing.
Quantum Inf. Process., 2015

2014
Provably Secure Identity-Based Threshold Decryption on Access Structure.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2011
Identity-based multi-receiver threshold signcryption scheme.
Secur. Commun. Networks, 2011

2009
A secret sharing scheme based on (<i>t</i>, <i>n</i>) threshold and adversary structure.
Int. J. Inf. Sec., 2009

A Model of Intrusion Tolerant System Based on Game Theory.
Comput. Inf. Sci., 2009


  Loading...