{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T17:06:52Z","timestamp":1742404012881},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540655145"},{"type":"electronic","value":"9783540492085"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-49208-9_17","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T09:07:37Z","timestamp":1187255257000},"page":"200-213","source":"Crossref","is-referenced-by-count":3,"title":["Practical Free-Space Quantum Cryptography"],"prefix":"10.1007","author":[{"given":"R. J.","family":"Hughes","sequence":"first","affiliation":[]},{"given":"W. T.","family":"Buttler","sequence":"additional","affiliation":[]},{"given":"P. G.","family":"Kwiat","sequence":"additional","affiliation":[]},{"given":"S. K.","family":"Lamoreaux","sequence":"additional","affiliation":[]},{"given":"G. G.","family":"Luther","sequence":"additional","affiliation":[]},{"given":"G. L.","family":"Morgan","sequence":"additional","affiliation":[]},{"given":"J. E.","family":"Nordholt","sequence":"additional","affiliation":[]},{"given":"C. G.","family":"Peterson","sequence":"additional","affiliation":[]},{"given":"C. M.","family":"Simmons","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,5,21]]},"reference":[{"key":"17_CR1","unstructured":"C. H. Bennett, and Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Proc. of IEEE Int. Conf. on Comp., Sys., and Sig. Proc., Bangalore, India (1984) 175."},{"key":"17_CR2","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1997","unstructured":"A. J. Menezes, van Oorschot, P. C., and Vanstone, S. A.: Handbook of Applied Cryptography. CRC Press, New York (1997)."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1209\/0295-5075\/23\/6\/001","volume":"23","author":"A. Muller","year":"1993","unstructured":"A. Muller, Breguet, J., and Gisin, N.: Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1 km. Europhys. Lett. 23 (1993) 383.","journal-title":"Europhys. Lett."},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1209\/epl\/i1996-00343-4","volume":"33","author":"A. Muller","year":"1996","unstructured":"A. Muller, Zbinden, H., and Gisin, N.: Quantum cryptography over 23 km in installed under-lake telecom fiber. Europhys. Lett. 33 (1996) 335.","journal-title":"Europhys. Lett."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1049\/el:19930424","volume":"29","author":"P. D. Townsend","year":"1993","unstructured":"P. D. Townsend, Rarity, J. G., and Tapster, P. R.: Enhanced single-photon fringe visibility in a 10 km-long prototype quantum cryptography channel. Elec. Lett. 29 (1993) 634.","journal-title":"Elec. Lett."},{"key":"17_CR6","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1364\/OL.20.001695","volume":"20","author":"C. Marand","year":"1995","unstructured":"C. Marand, and Townsend, P. D.: Quantum key distribution over distances as long as 30 km. Opt. Lett. 20 (1995) 1695.","journal-title":"Opt. Lett."},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"2949","DOI":"10.1364\/AO.33.002949","volume":"33","author":"J. D. Franson","year":"1994","unstructured":"J. D. Franson, and Ilves, H.: Quantum cryptography using optical fibers. Appl. Opt. 33 (1994) 2949.","journal-title":"Appl. Opt."},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1080\/00107519508222149","volume":"36","author":"R. J. Hughes","year":"1995","unstructured":"R. J. Hughes, Alde, D. M., Dyer, P., Luther, G. G., Morgan, G. L., and Schauer, M.: Quantum cryptography. Contemp. Phys. 36 (1995) 149.","journal-title":"Contemp. Phys."},{"key":"17_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/3-540-68697-5_25","volume-title":"Quantum cryptography over underground optical fibers","author":"R. J. Hughes","year":"1996","unstructured":"R. J. Hughes, Luther, G. G., Morgan, G. L., Peterson, C. G., and Simmons, C.: Quantum cryptography over underground optical fibers. Lecture Notes In Computer Science 1109 (1996) 329."},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1117\/12.277644","volume":"3076","author":"R. J. Hughes","year":"1997","unstructured":"R. J.Hughes, Buttler, W. T., Kwiat, P.G., Luther, G.G., Morgan, G. L., Nordholt, J. E., Peterson, C. G., and Simmons, C. M.: Secure communications using quantum cryptography. Proc. of SPIE 3076 (1997) 2.","journal-title":"Proc. of SPIE"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"W.T. Buttler, Hughes, R.J., Kwiat, P.G., Luther, G. G., Morgan, G.L., Nordholt, J. E., Peterson, C.G., and Simmons, C. M.: Free-space quantum-key distribution. Scheduled for Phys. Rev. A 57 (1998).","DOI":"10.1103\/PhysRevA.57.2379"},{"key":"17_CR12","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.1364\/OL.21.001854","volume":"21","author":"B. C. Jacobs","year":"1996","unstructured":"B. C. Jacobs, and Franson, J. D.: Quantum cryptography in free space. Opt. Lett. 21 (1996) 1854.","journal-title":"Opt. Lett."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1088\/0954-8998\/1\/1\/008","volume":"1","author":"J. G. Walker","year":"1989","unstructured":"J. G. Walker, Seward, S. F., Rarity, J. G., and Tapster, P. R.: Range measurement photon by photon. Quant. Opt. 1 (1989) 75.","journal-title":"Quant. Opt."},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1088\/0954-8998\/3\/4\/002","volume":"3","author":"S. F. Seward","year":"1991","unstructured":"S. F. Seward, Tapster, P. R., Walker, J. G., and Rarity, J. G.: Daylight demonstration of a low-light-level communication system using correlated photon pairs. Quant. Opt. 3 (1991) 201.","journal-title":"Quant. Opt."},{"key":"17_CR15","first-page":"141","volume-title":"Compensation of atmospheric optical distortion using a synthetic beacon","author":"C. A. Primmerman","year":"1991","unstructured":"C. A. Primmerman, Murphy, D. V., Page, D. A., Zollars, B. G., and Barclay, H. T.: Compensation of atmospheric optical distortion using a synthetic beacon. Nature (London) 353 (1991) 141."},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C. H. Bennett","year":"1992","unstructured":"C. H. Bennett: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68 (1992) 3121.","journal-title":"Phys. Rev. Lett."},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1103\/PhysRevD.9.853","volume":"9","author":"J. F. Clauser","year":"1974","unstructured":"J. F. Clauser: Experimental distinction between quantum and classical fieldtheoretic predictions for photoelectric effect. Phys. Rev. D 9 (1974) 853.","journal-title":"Phys. Rev. D"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W. K. Wooters","year":"1982","unstructured":"W. K. Wooters, and Zurek, W. H.: A single quantum cannot be cloned. Nature (London) 299 (1982) 802.","journal-title":"Nature (London)"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1103\/PhysRevA.50.1047","volume":"50","author":"A. K. Ekert","year":"1994","unstructured":"A. K. Ekert, Huttner, B., Palma, G. M., and Peres, A.: Eavesdropping on quantum cryptosystems. Phys. Rev. A 50 (1994) 1047.","journal-title":"Phys. Rev. A"},{"key":"17_CR20","doi-asserted-by":"crossref","DOI":"10.1002\/0471213748","volume-title":"Fundamentals of Photonics","author":"B. E. A. Saleh","year":"1991","unstructured":"B. E. A. Saleh, and Teich, M. C.: Fundamentals of Photonics. Ch. 11, Jon Wiley and Sons, Inc., New York (1991)."},{"key":"17_CR21","volume-title":"Coding and Information Theory","author":"R. W. Hamming","year":"1980","unstructured":"R. W. Hamming: Coding and Information Theory. Prentice Hall, New Jersey (1980)."},{"key":"17_CR22","volume-title":"Error Detecting Codes, Self-Checking Circuits and Applications","author":"J. Wakerly","year":"1978","unstructured":"J. Wakerly: Error Detecting Codes, Self-Checking Circuits and Applications. North-Holland, New York (1978)."},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C. H. Bennett","year":"1995","unstructured":"C. H. Bennett, Brassard, G., Crepeau, C., and Maurer, U. M.: Generalized privacy amplifrication. IEEE Trans. Inf. Th. 41 1915 (1995).","journal-title":"IEEE Trans. Inf. Th."},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/T-AIEE.1926.5061224","volume":"XLV","author":"G. S. Vernam","year":"1926","unstructured":"G. S. Vernam: Cipher printing telegraph systems for secret wire and radio telegraphic communications. Trans. Am. Inst. Electr. Eng. XLV (1926) 295.","journal-title":"Trans. Am. Inst. Electr. Eng."}],"container-title":["Lecture Notes in Computer Science","Quantum Computing and Quantum Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49208-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:43:48Z","timestamp":1556757828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49208-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540655145","9783540492085"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-49208-9_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}