D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 54 Citations 8,690 256 World Ranking 2246 National Ranking 225

Overview

What is he best known for?

The fields of study he is best known for:

  • Statistics
  • Quantum mechanics
  • Algebra

Quantum cryptography, Protocol, Quantum, Computer security and Quantum mechanics are his primary areas of study. His Quantum cryptography research is multidisciplinary, incorporating perspectives in Quantum key distribution and Quantum network, Quantum information science, Quantum entanglement. Protocol is a subfield of Computer network that Qiao-Yan Wen tackles.

His study on Superdense coding is often connected to Protocol and Third party as part of broader study in Quantum. He interconnects Quantum secret sharing and Alice and Bob, Alice in the investigation of issues within Computer security. His Quantum mechanics study combines topics in areas such as Verifiable secret sharing, Homomorphic secret sharing, Cryptanalysis and Optics.

His most cited work include:

  • Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol (326 citations)
  • Quantum secure direct communication with χ -type entangled states (191 citations)
  • A simple participant attack on the brádler-dušek protocol (186 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Quantum, Quantum cryptography, Protocol and Computer network. His study ties his expertise on Scheme together with the subject of Computer security. His study in the fields of Quantum computer, Qubit and Greenberger–Horne–Zeilinger state under the domain of Quantum overlaps with other disciplines such as Protocol.

His Quantum cryptography study integrates concerns from other disciplines, such as Quantum key distribution, Quantum network and Theoretical computer science. The Protocol study combines topics in areas such as Eavesdropping, Quantum secret sharing and Secret sharing. He studied Quantum information science and Optics that intersect with Telecommunications.

He most often published in these fields:

  • Computer security (23.89%)
  • Quantum (18.97%)
  • Quantum cryptography (18.97%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (23.89%)
  • Quantum (18.97%)
  • Encryption (8.87%)

In recent papers he was focusing on the following fields of study:

Qiao-Yan Wen mostly deals with Computer security, Quantum, Encryption, Scheme and Computer network. Qiao-Yan Wen works mostly in the field of Computer security, limiting it down to concerns involving Server and, occasionally, Smart card and Computer security model. His research in Quantum intersects with topics in Algorithm and Applied mathematics.

His Encryption research is multidisciplinary, incorporating elements of Rank, Key, Verifiable secret sharing and Cryptography. Qiao-Yan Wen has included themes like Structure, Data integrity, Protocol and Access control in his Scheme study. His work on Quantum cryptography as part of general Quantum information study is frequently linked to Correlation function, therefore connecting diverse disciplines of science.

Between 2017 and 2021, his most popular works were:

  • Quantum private query: A new kind of practical quantum cryptographic protocol (70 citations)
  • An Anti-Quantum Transaction Authentication Approach in Blockchain (42 citations)
  • Secure multi-keyword ranked search over encrypted cloud data for multiple data owners (21 citations)

In his most recent research, the most cited papers focused on:

  • Statistics
  • Algebra
  • Cryptography

Qiao-Yan Wen spends much of his time researching Quantum, Computer security, Quantum key distribution, Quantum algorithm and Computer network. His Quantum research incorporates themes from Applied mathematics and Combinatorics. His work deals with themes such as Elliptic curve and Overhead, which intersect with Computer security.

He interconnects Theoretical computer science, Ideal, Field, Quantum cryptography and Database security in the investigation of issues within Quantum key distribution. His Quantum cryptography study combines topics in areas such as Protocol, Binary number, Robustness and Quantum correlation. His work in Computer network is not limited to one particular discipline; it also encompasses Verifiable secret sharing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

Su-Juan Qin;Fei Gao;Qiao-Yan Wen;Fu-Chen Zhu.
Physical Review A (2007)

330 Citations

An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement

Xiu-Bo Chen;Gang Xu;Xin-Xin Niu;Qiao-Yan Wen.
Optics Communications (2010)

273 Citations

Quantum secure direct communication with χ -type entangled states

Song Lin;Song Lin;Qiao-Yan Wen;Fei Gao;Fu-Chen Zhu.
Physical Review A (2008)

243 Citations

A simple participant attack on the brádler-dušek protocol

Fei Gao;Su-Juan Qin;Qiao-Yan Wen;Fu-Chen Zhu.
Quantum Information & Computation (2007)

218 Citations

A steganographic method for digital images with four-pixel differencing and modified LSB substitution

Xin Liao;Qiao-yan Wen;Jie Zhang.
Journal of Visual Communication and Image Representation (2011)

201 Citations

Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state

Fei Gao;Su-Juan Qin;Qiao-Yan Wen;Fu-Chen Zhu.
Optics Communications (2010)

195 Citations

Improving the security of multiparty quantum secret sharing against an attack with a fake signal

Su-Juan Qin;Su-Juan Qin;Fei Gao;Qiao-Yan Wen;Fu-Chen Zhu.
Physics Letters A (2006)

178 Citations

Cryptanalysis of the arbitrated quantum signature protocols

Fei Gao;Su-Juan Qin;Fen-Zhuo Guo;Qiao-Yan Wen.
Physical Review A (2011)

168 Citations

Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication

Fei Gao;FenZhuo Guo;QiaoYan Wen;FuChen Zhu.
Science China-physics Mechanics & Astronomy (2008)

162 Citations

Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]

Fei Gao;Qiao-Yan Wen;Fu-Chen Zhu.
Physics Letters A (2007)

151 Citations

Best Scientists Citing Qiao-Yan Wen

Tzonelih Hwang

Tzonelih Hwang

National Cheng Kung University

Publications: 87

Yixian Yang

Yixian Yang

Beijing University of Posts and Telecommunications

Publications: 45

Anirban Pathak

Anirban Pathak

Jaypee Institute of Information Technology

Publications: 27

Ahmed A. Abd El-Latif

Ahmed A. Abd El-Latif

Menoufia University

Publications: 21

Shao-Ming Fei

Shao-Ming Fei

Capital Normal University

Publications: 20

Nanrun Zhou

Nanrun Zhou

Nanchang University

Publications: 20

Liusheng Huang

Liusheng Huang

University of Science and Technology of China

Publications: 18

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 17

Fei Gao

Fei Gao

Beijing University of Posts and Telecommunications

Publications: 14

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 12

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 11

Fu-Guo Deng

Fu-Guo Deng

Beijing Normal University

Publications: 11

Prasanta K. Panigrahi

Prasanta K. Panigrahi

Indian Institute of Science Education and Research Kolkata

Publications: 10

Gui-Lu Long

Gui-Lu Long

Tsinghua University

Publications: 10

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 9

Debiao He

Debiao He

Wuhan University

Publications: 9

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.