{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:53:06Z","timestamp":1725573186396},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540330523"},{"type":"electronic","value":"9783540330585"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11689522_17","type":"book-chapter","created":{"date-parts":[[2006,2,25]],"date-time":"2006-02-25T06:47:58Z","timestamp":1140850078000},"page":"177-186","source":"Crossref","is-referenced-by-count":1,"title":["Trojan Horse Attack Strategy on Quantum Private Communication"],"prefix":"10.1007","author":[{"given":"Jinye","family":"Peng","sequence":"first","affiliation":[]},{"given":"Guangqiang","family":"He","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Guihua","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","volume-title":"Applied Cryptography:protocols, algorithms, and source code in C","author":"B. Schneier","year":"1994","unstructured":"Schneier, B.: Applied Cryptography:protocols, algorithms, and source code in C. John Wiley & Sons, Inc., Chichester (1994)"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S. Wiesner","year":"1983","unstructured":"Wiesner, S.: Conjugate coding. Sigact News\u00a015, 78\u201398 (1983)","journal-title":"Sigact News"},{"key":"17_CR3","first-page":"475","volume-title":"Advances in Cryptology: Proceedings of Crypto 1984","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Advances in Cryptology: Proceedings of Crypto 1984, August 1984, p. 475. Springer, Heidelberg (1984)"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography bases on Bell\u2019s theorem. Phys. Rev. Lett.\u00a067, 661\u2013664 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptology\u00a05, 3\u201328 (1992)","journal-title":"J. Cryptology"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M. Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A\u00a059, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H.-K. Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances. Science\u00a0283, 2050\u20132057 (1999)","journal-title":"Science"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Reviews of Modern Physics\u00a074, 145\u2013195 (2002)","journal-title":"Reviews of Modern Physics"},{"key":"17_CR9","unstructured":"Larsson, J. (November 13, 2001), http:\/\/xxx.lanl.gov\/quant-ph\/0111073"},{"key":"17_CR10","doi-asserted-by":"crossref","first-page":"24302","DOI":"10.1103\/PhysRevA.64.024302","volume":"64","author":"Y. Zhang","year":"2001","unstructured":"Zhang, Y., Li, C., Guo, G.: Phys. Rev. A \u00a064, 24302 (2001)","journal-title":"Phys. Rev. A"},{"key":"17_CR11","doi-asserted-by":"crossref","first-page":"14","DOI":"10.26421\/QIC2.1-2","volume":"2","author":"D.W. Leung","year":"2002","unstructured":"Leung, D.W.: Quantun vernam cipher. Quantum information and computation\u00a02, 14\u201330 (2002)","journal-title":"Quantum information and computation"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A. Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A\u00a059, 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W. Wootters","year":"1982","unstructured":"Wootters, W., Zurek, W.: A single quantum cannot be cloned. Nature\u00a0299, 802\u2013803 (1982)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11689522_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,24]],"date-time":"2021-07-24T08:56:40Z","timestamp":1627117000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11689522_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540330523","9783540330585"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11689522_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}