- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Opportunistic and Delay-Tolerant Networks
- Energy Efficient Wireless Sensor Networks
- Quantum Mechanics and Applications
- Caching and Content Delivery
- Cryptography and Data Security
- Mobile Ad Hoc Networks
- Technology Adoption and User Behaviour
- Interconnection Networks and Systems
- Embedded Systems Design Techniques
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Security in Wireless Sensor Networks
- Peer-to-Peer Network Technologies
- Parallel Computing and Optimization Techniques
- Optical Wireless Communication Technologies
- User Authentication and Security Systems
- Network Traffic and Congestion Control
- Age of Information Optimization
- Cryptographic Implementations and Security
- Advanced Optical Network Technologies
- Quantum-Dot Cellular Automata
- Geomechanics and Mining Engineering
- Railway Systems and Energy Efficiency
Guangdong University of Finance
2012-2024
Hubei University of Science and Technology
2013-2024
National Formosa University
2008-2017
State Key Laboratory on Integrated Optoelectronics
2015
Chinese Academy of Sciences
2015
Institute of Semiconductors
2015
National Yunlin University of Science and Technology
2007-2010
Sun Yat-sen University
2008
Hefei University of Technology
2008
Blind quantum computation allows a client who does not have enough resources or technologies to achieve on remote server such that the client's input, output, and algorithm remain unknown server. Up now, single- double-server blind been considered. In this work, we propose triple-server protocol where can delegate three servers by use of entanglement swapping. Furthermore, communicate with each other is almost classical since one require any computational power, memory, ability prepare...
Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited capability. Almost all existing SQKD protocols have been proved be robust in theory, namely that if an eavesdropper tries gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist reality their imperfection may result side-channel attacks, which can used by adversary get information on secret string. In this...
Recently, multiparty quantum key agreement (MQKA) protocols have gained increasing attention. Several MQKA in the traveling mode been proposed for higher generation rates, which, however, are vulnerable to a collusive attack presented by Liu. In this paper, an analysis of Liu's attacks on Cao et al.'s protocol is given, based which efficient that requires only sequential communication single d-level system put forward. Because system, our has huge advantages scalability and can be realized...
In the harsh environment, wireless sensor networks can suffer from a significant damage that causes many nodes/links to fail simultaneously and network get splitted into multiple disjoint partitions. such case, linking separated partitions by placing least number of relay nodes obstacle-avoiding re-establish strongly connected topology is necessary maintain functional operations network. However, problem finding minimum count position NP-hard hence heuristics methods are preferred. this...
We experimentally demonstrate a high-speed phosphorescent white light emitting diode (LED) visible communication (VLC) system without utilizing an optical blue filter. Here, the response is equalized by using proposed analog equalizers. The 3 dB bandwidth of VLC link could be extended from to 132 MHz, which allows 330 Mbit/s non-return-to-zero on–off keying (NRZ-OOK) data transmission with bit error ratio (BER) 7.2×10 10 and 672 64-quadrature amplitude modulation (64-QAM) BER 3.2×10 3. These...
Wireless sensor networks(WSNs) have many applications in recent years, especially some harsh environment, such as battlefield reconnaissance. WSNs may suffer from a large scale damage which causes nodes to fail and the network get partitioned into disjoint segments. So order avoid negative effects on application, restoring connectivity is crucial case. In this paper, we study restoration of wireless networks (WSNs), analyze summarize related main direction research results classify solution...
Abstract Fairness is an important standard needed to be considered in a secure quantum key agreement (QKA) protocol. However, it found that most of the protocols travelling model are not fair, i.e., some dishonest participants can collaborate predetermine final without being detected. Thus, how construct fair and protocol has obtained much attention. In this paper, new multiparty QKA resist collusive attack proposed. More specifically, we show client-server scenario, possible for clients...
Mobile sensor networks (MSNs) have many applications in recent years, especially some harsh environment, such as coastal and border protection, search-and-rescue, battlefield reconnaissance so on. MSNs may suffer from a large-scale damage which causes nodes to fail the network get partitioned into isolate islands. So order avoid negative effects on application, restoring connectivity is crucial case. In this paper, we propose novel method, OACRPANM, obstacle restore based power adjustment...
Consumer electronics products contain complex System-on-Chip (SOC) which needs efficient communication interconnects. Network-on-Chip (NoC) is a scalable solution for the requirement of SoC. Devising an effective routing algorithm NoC great challenge. In this paper, we present methodology designing algorithms based on divide-conquer approach. total, 266 have better performance than Odd-Even are obtained. Simulation results show that new can decrease average packet latency up to 54.5% over Odd-Even.
The Internet of Things (IoT) paradigm has applications in many domains and is growing these days progressively. are e-business, e-healthcare, e-transportation. Recently, the container microservices-based Mobile Cloud Computing (MCC) gained popularity, a lightweight framework compared to monolithic virtual machine-based system. MCC combines fog nodes or cloud with base station run applications. However, storing sensitive data IoT on untrusted failure services critical challenges existing...
During the past decade, information systems investment has grown rapidly worldwide and project development become one of most important targets in e-business. Yet, failure projects is a common occurrence many organizations around world. A theoretical model derived based upon organizational learning theory prior research order to examine effects on lack team's expertise risk. survey method applied test hypotheses proposed by model, Taiwanese corporate companies serve as examples. After...
The failure of IS projects is a common occurrence in many organizations around the world. One explanation for high rate that managers are not taking prudent measure to understand and manage risks associated with projects. As continue invest substantial resources efforts on projects, controlling involved such order increase their performance becomes critical. Capability Maturity Model (CMM) taken as reference model improving software development process maturity. Our study examined impacts...
Abstract E-learning has been used very widely to offer solutions in higher education accordance with the demands of knowledge-based society. This study aimed generally explain e-learning systems usage behavior any country and region. From an evolutionary psychology perspective, two important evolved psychological traits (i.e., least effort social interaction) were explored for their impacts on students’ decision making towards systems. Based these traits, a new theoretical framework was...
Consumer electronics products contain complex System-on-Chip (SOC). The communication efficiency among these units becomes crucial. Until recent years Network-on-Chip (NoC) is presented to be the infrastructure. In this paper, we conduct a case study of Odd-Even turn model which an adaptive routing algorithm for NoC. Simulation results show that congestion happens in local region more seriously. It suggests when designing algorithm, researchers should take issue into consideration.
Wireless ad hoc/sensor networks (WASN) have seen increased application in three-dimensional (3D) environments, such as underwater and aerial scenarios. However, WASN may be fragmented or unable to connect continuously due the harsh surrounding environment high mobility. Therefore, restoring network connectivity transmit data real time is very important. This paper focuses on critical task of 3D WASN, a complex issue given that existing restoration algorithms for two-dimensional environments...
Abstract Delay tolerant networks (DTNs) is a network evolved from mobile networks. Differing the traditional network, which has stable end‐to‐end transmission path, DTNs are sparse and intermittently connected ad hoc widely used in harsh environments, such as battlefields, seabed, space communication networks, so on. In DTNs, intermittent connectivity, partitioned long delays node mobility characteristics make fail to communicate frequently, therefore, how successfully forward message of...
Wireless Sensor Networks (WSNs)/Mobile Ad hoc and Delay-tolerant have many applications in recent years. Topology control is one of the most important research topics wireless networks. It not only can prolong lifetime network but also reduce signal interference. Therefore, topology great significance. This paper analyzes summarizes main directions results problem networks years, at same time classifies topological solutions sensor / mobile ad-hoc delay tolerant networks, finally, points out...
Chameleon signatures are based on the well established hash-and-sign paradigm, where a chameleon hash function is used to compute cryptographic message digest. simultaneously provide properties of non-repudiation and non-transferability for signed message. However, initial constructions suffer from problem key exposure hashing. Recently, some specific key-exposure free hashing presented in setting certificate-based systems, but few works done identity-based systems. In this paper, we first...