Deterministic remote preparation of an arbitrary W-class state with multiparty
Ming Xing Luo;秀波 陈;Song Ya Ma;义先 杨;正明 胡
2010 Journal of Physics B: Atomic, Molecular and Optical Physics
66
被引量On the security of HY-key authentication scheme
B. Zhan;子臣 李;义先 杨;正明 胡
1999-5-25 Computer Communications
24
被引量On the crosscorrelation of sequences with the decimation factor d = pn+1/p+1 - pn-1/2
正明 胡;X. Li;D. Mills;E. Müller;W. Sun;W. Willems;义先 杨;Z. Zhang
2001 Applicable Algebra in Engineering, Communications and Computing
23
被引量Remote preparation of an arbitrary two-qubit state with three-party
Ming Xing Luo;秀波 陈;Song Ya Ma;义先 杨;正明 胡
2010-6 International Journal of Theoretical Physics
19
被引量Comment on Wu et al.'s Server-aided Verification Signature Schemes
Zhiwei Wang;Licheng Wang;义先 杨;正明 胡
2010 International Journal of Network Security
13
被引量New signature schemes based on discrete logarithms and factoring
Q. X. Wu;义先 杨;正明 胡
2001-3 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
10
被引量Fair electronic check systems with reusable refund
Chun Guang Ma;义先 杨;正明 胡;Peng Wu
2005-9 Tien Tzu Hsueh Pao/Acta Electronica Sinica
8
被引量Watermark algorithm based on modulo
Guang Sheng Xia;Ming Qi Chen;义先 杨;正明 胡
2000-11 Jisuanji Xuebao/Chinese Journal of Computers
8
被引量Provably secure and effcient identity-based signature scheme based on cubic residues
Zhiwei Wang;Licheng Wang;Shihui Zheng;义先 杨;正明 胡
2012-1 International Journal of Network Security
7
被引量Mobile IP authentication protocol based on identity
Sheng Zhang;Guo Ai Xu;正明 胡;义先 杨;Xi Zeng Zhou
2005-6 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
6
被引量