{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:08Z","timestamp":1726064288716},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_29","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"741-762","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["QKD Protocols Security Between Theory and Engineering Implementation"],"prefix":"10.1007","author":[{"given":"Hicham","family":"Amellal","sequence":"first","affiliation":[]},{"given":"Abdelmajid","family":"Meslouhi","sequence":"additional","affiliation":[]},{"given":"Abderahim El","family":"Allati","sequence":"additional","affiliation":[]},{"given":"Anass El","family":"Haddadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B B Gupta","year":"2016","unstructured":"Gupta, B. B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Hershey: IGI Global."},{"key":"29_CR2","volume-title":"Computer and cyber security: Principles, algorithm, applications, and perspectives","author":"B B Gupta","year":"2018","unstructured":"Gupta, B. B. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (Vol. 666). Boca Raton: CRC Press."},{"key":"29_CR3","first-page":"1402","volume":"6","author":"L Wang","year":"2018","unstructured":"Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE IoT Journal, 6, 1402\u20131409.","journal-title":"IEEE IoT Journal"},{"key":"29_CR4","volume-title":"Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Future generation computer systems","author":"A Tewari","year":"2018","unstructured":"Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Future generation computer systems. Amsterdam: Elsevier."},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964\u2013975.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"29_CR6","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2018","unstructured":"Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423\u2013441.","journal-title":"Telecommunication Systems"},{"issue":"3","key":"29_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.2017070101","volume":"7","author":"S Gupta","year":"2017","unstructured":"Gupta, S., & Gupta, B. B. (2017). Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: Present and future challenges. International Journal of Cloud Applications and Computing, 7(3), 1\u201343.","journal-title":"International Journal of Cloud Applications and Computing"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"A P Plageras","year":"2018","unstructured":"Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor BIG Data collection\u2013processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349\u2013357.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"29_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.2017010101","volume":"7","author":"B B Gupta","year":"2017","unstructured":"Gupta, B. B., Gupta, S., & Chaudhary, P. (2017). Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. International Journal of Cloud Applications and Computing, 7(1), 1\u201331.","journal-title":"International Journal of Cloud Applications and Computing"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.future.2017.03.029","volume":"83","author":"M S Hossain","year":"2018","unstructured":"Hossain, M. S., Muhammad, G., Abdul, W., Song, B., & Gupta, B. B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems, 83, 596\u2013606.","journal-title":"Future Generation Computer Systems"},{"issue":"14","key":"29_CR11","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bruss","year":"1998","unstructured":"Bruss, D. (1998). Optimal eavesdropping in quantum cryptography with six states. Physical Review Letters, 81(14), 3018\u20133021","journal-title":"Physical Review Letters"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92, 057901.","journal-title":"Physical Review Letters"},{"key":"29_CR13","doi-asserted-by":"crossref","first-page":"73","DOI":"10.26421\/QIC7.1-2-3","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi, B., Fung, C.-H. F, Lo, H.-K., & Ma, X. (2007). Time-shift attack in practical quantum cryptosystems. Quantum Information and Computation, 7, 73\u201382.","journal-title":"Quantum Information and Computation"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"449","DOI":"10.3938\/jkps.70.449","volume":"70","author":"H Amellal","year":"2017","unstructured":"Amellal, H., Meslouhi, A., Hassouni, Y., El Baz, M., & El Allati, A. (2017). Cryptanalysis on a scheme to share information via employing discrete algorithm to quantum states. Journal of the Korean Physical Society, 70, 449\u2013453. https:\/\/doi.org\/10.3938\/jkps.70.449","journal-title":"Journal of the Korean Physical Society"},{"key":"29_CR15","unstructured":"Amellal, H., Meslouhi, A., Hassouni, Y., & El Allati, A. (2017). SQL injection principle against BB84 protocol. International Journal of Computers and Communications, 11. ISSN: 2074-1294."},{"key":"29_CR16","volume-title":"The principles of quantum mechanics","author":"P A M Dirac","year":"1947","unstructured":"Dirac, P. A. M. (1947). The principles of quantum mechanics (3rd ed.). Oxford: Clarendon Press.","edition":"3"},{"issue":"6","key":"29_CR17","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/0375-9601(82)90084-6","volume":"92","author":"D Dieks","year":"1982","unstructured":"Dieks, D. (1982). Communication by EPR devices. Physics Letters A, 92(6), 271\u2013272.","journal-title":"Physics Letters A"},{"key":"29_CR18","doi-asserted-by":"publisher","first-page":"065001","DOI":"10.1088\/1367-2630\/11\/6\/065001","volume":"11","author":"S Nauerth","year":"2009","unstructured":"Nauerth, S., F\u00fcrst, M., Schmitt-Manderbach, T., Weier, H., & Weinfurter, H. (2009). Information leakage via side channels in freespace BB84 quantum cryptography. New Journal of Physics, 11, 065001.","journal-title":"New Journal of Physics"},{"key":"29_CR19","volume-title":"The principles of quantum mechanics","author":"P A M Dirac","year":"1947","unstructured":"Dirac, P. A. M. (1947). The principles of quantum mechanics (3rd ed.). Oxford: Clarendon Press.","edition":"3"},{"key":"29_CR20","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W K Wootters","year":"1982","unstructured":"Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299, 802\u2013803. https:\/\/doi.org\/10.1038\/299802a0","journal-title":"Nature"},{"key":"29_CR21","doi-asserted-by":"publisher","first-page":"9388393","DOI":"10.1364\/OE.15.009388","volume":"15","author":"A Lamas-Linares","year":"2007","unstructured":"Lamas-Linares, A., & Kurtsiefer, C. (2007). Breaking a quantum key distribution system through a timing side channel. Optics Express, 15, 9388393.","journal-title":"Optics Express"},{"key":"29_CR22","first-page":"052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N. (2000). Security against individual attacks for realistic quantum key distribution. Physics Letters A, 61, 052304.","journal-title":"Physics Letters A"},{"key":"29_CR23","doi-asserted-by":"publisher","first-page":"69105","DOI":"10.1080\/09500340410001730986","volume":"52","author":"V Makarov","year":"2005","unstructured":"Makarov, V., & Hjelme, D. R. (2005). Faked states attack on quantum cryptosystems. Journal of Modern Optics, 52, 69105.","journal-title":"Journal of Modern Optics"},{"key":"29_CR24","doi-asserted-by":"publisher","first-page":"065003","DOI":"10.1088\/1367-2630\/11\/6\/065003","volume":"11","author":"V Makarov","year":"2009","unstructured":"Makarov, V. (2009). Controlling passively quenched single photon detectors by bright light. New Journal of Physics, 11, 065003.","journal-title":"New Journal of Physics"},{"issue":"67","key":"29_CR25","first-page":"92","volume":"8","author":"V Makarov","year":"2008","unstructured":"Makarov, V., & Skaar, J. (2008). Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK and Ekert protocols. Quantum Information and Computation, 8(67), 92\u201393.","journal-title":"Quantum Information and Computation"},{"key":"29_CR26","doi-asserted-by":"publisher","first-page":"022313","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V Makarov","year":"2006","unstructured":"Makarov, V., Anisimov, A., & Skaar, J. (2006). Effects of detector efficiency mismatch on security of quantum cryptosystems. Physical Review A, 74, 022313.","journal-title":"Physical Review A"},{"key":"29_CR27","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92, 057901.","journal-title":"Physical Review Letters"},{"key":"29_CR28","unstructured":"Bennett, C. H., & Brassard, G. (1984). Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (pp. 71, 79, 92). New York: IEEE Press."},{"key":"29_CR29","doi-asserted-by":"publisher","first-page":"042333","DOI":"10.1103\/PhysRevA.78.042333","volume":"78","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Fung, C.-H. F., Qi, B., Chen, C., & Lo, H.-K. (2008). Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Physical Review A, 78, 042333.","journal-title":"Physical Review A"},{"key":"29_CR30","doi-asserted-by":"publisher","first-page":"065001","DOI":"10.1088\/1367-2630\/11\/6\/065001","volume":"11","author":"S Nauerth","year":"2009","unstructured":"Nauerth, S., F\u00fcrst, M., Schmitt-Manderbach, T., Weier, H., & Weinfurter, H. (2009). Information leakage via side channels in freespace BB84 quantum cryptography. New Journal of Physics, 11, 065001.","journal-title":"New Journal of Physics"},{"key":"29_CR31","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., & Makarov, V. (2010). Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics, 4, 686\u2013689. https:\/\/doi.org\/10.1038\/nphoton.2010.214","journal-title":"Nature Photonics"},{"key":"29_CR32","doi-asserted-by":"publisher","first-page":"5589","DOI":"10.1007\/s11128-010-0213-y","volume":"10","author":"A Allati El","year":"2011","unstructured":"El Allati, A., El Baz, M., & Hassouni, Y. (2011). Quantum key distribution via tripartite coherent states. Quantum Information Processing, 10, 5589\u20135602.","journal-title":"Quantum Information Processing"},{"key":"29_CR33","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1088\/1464-4266\/6\/4\/001","volume":"6","author":"H Eleuch","year":"2004","unstructured":"Eleuch, H., & Bennaceur, R. (2004). Nonlinear dissipation and the quantum noise of light in semiconductor microcavities. Journal of Optics B: Quantum and Semiclassical Optics, 6, 189.","journal-title":"Journal of Optics B: Quantum and Semiclassical Optics"},{"key":"29_CR34","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.physa.2006.04.084","volume":"371","author":"E M F Curado","year":"2006","unstructured":"Curado, E. M. F., Rego-Monteiro, M. A., Rodrigues, L. M. C. S., & Hassouni, Y. (2006). Coherent states for a degenerate system: The hydrogen atom. Physica A, 371, 16.","journal-title":"Physica A"},{"key":"29_CR35","doi-asserted-by":"publisher","first-page":"2766","DOI":"10.1103\/PhysRev.131.2766","volume":"131","author":"R J Glauber","year":"1963","unstructured":"Glauber, R. J. (1963). Coherent and incoherent states of the radiation field. Physical Review, 131, 2766 (1963).","journal-title":"Physical Review"},{"issue":"6","key":"29_CR36","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A Ekert","year":"1991","unstructured":"Ekert, A. (1991). Quantum cryptography based on Bell\u2019s theorem. Physical Review Letters, 67(6), 661\u2013663.","journal-title":"Physical Review Letters"},{"key":"29_CR37","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-94-017-0849-4_10","volume-title":"Bell\u2019s theorem, quantum theory and conceptions of the universe","author":"D Greenberger","year":"1989","unstructured":"Greenberger, D., Horne, M. A., & Zeilinger, A. (1989). Going beyond Bell\u2019s theorem. In M. Kafatos (Ed.), Bell\u2019s theorem, quantum theory and conceptions of the universe (Vol. 80, pp. 69\u201372). Dordrecht: Kluwer."},{"issue":"6","key":"29_CR38","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1142\/S0219749906002274","volume":"4","author":"C Li","year":"2006","unstructured":"Li, C., Wang, Z., Wu, C., Song, H. S., & Zhou, L. (2006). Certain quantum key distribution achieved by using Bell states. International Journal of Quantum Information, 4(6), 899\u2013906.","journal-title":"International Journal of Quantum Information"},{"key":"29_CR39","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C H Bennett","year":"1992","unstructured":"Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68, 3121.","journal-title":"Physical Review Letters"},{"key":"29_CR40","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1007\/s11128-015-1002-4","volume":"14","author":"H Amellal","year":"2015","unstructured":"Amellal, H., Meslouhiy, A., Hassouni, Y., & El Baz, M. (2015). A quantum optical firewall based on simple quantum devices. Quantum Information Processing, 14, 2617\u20132633. https:\/\/doi.org\/10.1007\/s11128-015-1002-4","journal-title":"Quantum Information Processing"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T15:37:17Z","timestamp":1665329837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_29","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}