Quantum cryptography, Protocol, Quantum, Computer security and Quantum mechanics are his primary areas of study. His Quantum cryptography research is multidisciplinary, incorporating perspectives in Quantum key distribution and Quantum network, Quantum information science, Quantum entanglement. Protocol is a subfield of Computer network that Qiao-Yan Wen tackles.
His study on Superdense coding is often connected to Protocol and Third party as part of broader study in Quantum. He interconnects Quantum secret sharing and Alice and Bob, Alice in the investigation of issues within Computer security. His Quantum mechanics study combines topics in areas such as Verifiable secret sharing, Homomorphic secret sharing, Cryptanalysis and Optics.
The scientist’s investigation covers issues in Computer security, Quantum, Quantum cryptography, Protocol and Computer network. His study ties his expertise on Scheme together with the subject of Computer security. His study in the fields of Quantum computer, Qubit and Greenberger–Horne–Zeilinger state under the domain of Quantum overlaps with other disciplines such as Protocol.
His Quantum cryptography study integrates concerns from other disciplines, such as Quantum key distribution, Quantum network and Theoretical computer science. The Protocol study combines topics in areas such as Eavesdropping, Quantum secret sharing and Secret sharing. He studied Quantum information science and Optics that intersect with Telecommunications.
Qiao-Yan Wen mostly deals with Computer security, Quantum, Encryption, Scheme and Computer network. Qiao-Yan Wen works mostly in the field of Computer security, limiting it down to concerns involving Server and, occasionally, Smart card and Computer security model. His research in Quantum intersects with topics in Algorithm and Applied mathematics.
His Encryption research is multidisciplinary, incorporating elements of Rank, Key, Verifiable secret sharing and Cryptography. Qiao-Yan Wen has included themes like Structure, Data integrity, Protocol and Access control in his Scheme study. His work on Quantum cryptography as part of general Quantum information study is frequently linked to Correlation function, therefore connecting diverse disciplines of science.
Qiao-Yan Wen spends much of his time researching Quantum, Computer security, Quantum key distribution, Quantum algorithm and Computer network. His Quantum research incorporates themes from Applied mathematics and Combinatorics. His work deals with themes such as Elliptic curve and Overhead, which intersect with Computer security.
He interconnects Theoretical computer science, Ideal, Field, Quantum cryptography and Database security in the investigation of issues within Quantum key distribution. His Quantum cryptography study combines topics in areas such as Protocol, Binary number, Robustness and Quantum correlation. His work in Computer network is not limited to one particular discipline; it also encompasses Verifiable secret sharing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A survey on the security of blockchain systems
Xiaoqi Li;Peng Jiang;Ting Chen;Xiapu Luo.
Future Generation Computer Systems (2017)
Cryptanalysis of the Hillery-Bužek-Berthiaume quantum secret-sharing protocol
Su-Juan Qin;Fei Gao;Qiao-Yan Wen;Fu-Chen Zhu.
Physical Review A (2007)
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement
Xiu-Bo Chen;Gang Xu;Xin-Xin Niu;Qiao-Yan Wen.
Optics Communications (2010)
Quantum secure direct communication with χ -type entangled states
Song Lin;Song Lin;Qiao-Yan Wen;Fei Gao;Fu-Chen Zhu.
Physical Review A (2008)
A simple participant attack on the brádler-dušek protocol
Fei Gao;Su-Juan Qin;Qiao-Yan Wen;Fu-Chen Zhu.
Quantum Information & Computation (2007)
A steganographic method for digital images with four-pixel differencing and modified LSB substitution
Xin Liao;Qiao-yan Wen;Jie Zhang.
Journal of Visual Communication and Image Representation (2011)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state
Fei Gao;Su-Juan Qin;Qiao-Yan Wen;Fu-Chen Zhu.
Optics Communications (2010)
Improving the security of multiparty quantum secret sharing against an attack with a fake signal
Su-Juan Qin;Su-Juan Qin;Fei Gao;Qiao-Yan Wen;Fu-Chen Zhu.
Physics Letters A (2006)
Cryptanalysis of the arbitrated quantum signature protocols
Fei Gao;Su-Juan Qin;Fen-Zhuo Guo;Qiao-Yan Wen.
Physical Review A (2011)
Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication
Fei Gao;FenZhuo Guo;QiaoYan Wen;FuChen Zhu.
Science China-physics Mechanics & Astronomy (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Beijing University of Posts and Telecommunications
Beijing University of Posts and Telecommunications
Commonwealth Scientific and Industrial Research Organisation
Beijing University of Posts and Telecommunications
Northwestern Polytechnical University
University of Leicester
Wuhan University
University of Surrey
University of Technology Sydney
University of Wollongong
University of Cambridge
University of Barcelona
University of Toledo
Grenoble Alpes University
University of Helsinki
University of Michigan–Ann Arbor
Karolinska University Hospital
InterAmerican University of Puerto Rico
CSL (United States)
University of Leicester
Max Planck Society
Monash University
Oregon Research Institute
University of Arizona
Johns Hopkins University School of Medicine
University of Southern California