{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:56:22Z","timestamp":1726408582985},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_6","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"56-67","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anti-noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model"],"prefix":"10.1007","author":[{"given":"Zhiguo","family":"Qu","sequence":"first","affiliation":[]},{"given":"Zhexi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenwen","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"6_CR1","unstructured":"Yu, S.L., Pan, J.W.: I have a quantum dream in mind. The People\u2019s Daily, 04 June 2014"},{"issue":"1","key":"6_CR2","first-page":"47","volume":"56","author":"ZG Qu","year":"2018","unstructured":"Qu, Z.G., Zhu, T.C., Wang, J.W., Wang, X.J.: A novel quantum stegonagraphy based on brown states. Comput. Mater. Continua 56(1), 47\u201359 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.commatsci.2018.05.053","volume":"56","author":"WJ Liu","year":"2018","unstructured":"Liu, W.J., Chen, Z.Y., Liu, J.S., Su, Z.F., Chi, L.H.: Full-blind delegating private quantum computation. Comput. Mater. Continua 56(2), 211\u2013223 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"21","key":"6_CR4","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"6_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, vol. 175, pp. 175\u2013179 (1984)"},{"issue":"4","key":"6_CR6","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1103\/PhysRevA.76.040301","volume":"76","author":"M Hayashi","year":"2007","unstructured":"Hayashi, M.: Prior entanglement between senders enables perfect quantum network coding with modification. Phys. Rev. A 76(4), 538 (2007)","journal-title":"Phys. Rev. A"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1007\/978-3-540-70918-3_52","volume-title":"STACS 2007","author":"M Hayashi","year":"2007","unstructured":"Hayashi, M., Iwama, K., Nishimura, H., Raymond, R., Yamashita, S.: Quantum network coding. In: Thomas, W., Weil, P. (eds.) STACS 2007. LNCS, vol. 4393, pp. 610\u2013621. Springer, Heidelberg (2007). \n                      https:\/\/doi.org\/10.1007\/978-3-540-70918-3_52"},{"issue":"10","key":"6_CR8","first-page":"1913","volume":"42","author":"T Shang","year":"2014","unstructured":"Shang, T., Zhao, X.J., Wang, C., et al.: Controlled quantum network coding scheme based on single controller. Acta Electronica Sinica 42(10), 1913\u20131917 (2014)","journal-title":"Acta Electronica Sinica"},{"issue":"13","key":"6_CR9","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Crepeau, C.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70(13), 1895\u20131899 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"18","key":"6_CR10","doi-asserted-by":"publisher","first-page":"180401","DOI":"10.1103\/PhysRevLett.110.180401","volume":"110","author":"T Moroder","year":"2012","unstructured":"Moroder, T., Kleinmann, M., Schindler, P., Monz, T., G\u00fchne, O., Blatt, R.: Certifying systematic errors in quantum experiments. Phys. Rev. Lett. 110(18), 180401 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"15","key":"6_CR11","doi-asserted-by":"publisher","first-page":"150501","DOI":"10.1103\/PhysRevLett.94.150501","volume":"94","author":"CZ Peng","year":"2005","unstructured":"Peng, C.Z., Yang, T., Bao, X.H., et al.: Experimental free-space distribution of entangled photon pairs over 13\u00a0km: towards satellite-based global quantum communication. Phys. Rev. Lett. 94(15), 150501 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"7410","key":"6_CR12","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1038\/nature11332","volume":"488","author":"J Yin","year":"2013","unstructured":"Yin, J., Ren, J.G., Lu, H., et al.: Quantum teleportation and entanglement distribution over 100-kilometre free-space channels. Nature 488(7410), 185\u2013188 (2013)","journal-title":"Nature"},{"issue":"18","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1923","DOI":"10.1016\/j.comcom.2009.06.009","volume":"32","author":"L Akter","year":"2009","unstructured":"Akter, L., Natarajan, B.: QoS constrained resource allocation to secondary users in cognitive radio networks. Comput. Commun. 32(18), 1923\u20131930 (2009)","journal-title":"Comput. Commun."},{"issue":"3","key":"6_CR14","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.optcom.2009.09.065","volume":"283","author":"SY Ma","year":"2009","unstructured":"Ma, S.Y., Chen, X.B., Luo, M.X.: Probabilistic quantum network coding of M-qudit states over the butterfly network. Opt. Commun. 283(3), 497\u2013501 (2009)","journal-title":"Opt. Commun."},{"issue":"20","key":"6_CR15","first-page":"1996","volume":"5","author":"SS Yan","year":"2012","unstructured":"Yan, S.S., Kuang, H.M., Guo, Y.: Quantum coding of butterfly network based on controlled quantum teleportation. National Sci. Paper Online Excellent Paper 5(20), 1996\u20132001 (2012)","journal-title":"National Sci. Paper Online Excellent Paper"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Nishimura, H.: Quantum network coding \u2014 How can network coding be applied to quantum information. In: International Symposium on Network Coding, pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/NetCod.2013.6570840"},{"issue":"81","key":"6_CR17","first-page":"1334","volume":"81","author":"AN Korotkov","year":"2010","unstructured":"Korotkov, A.N., Keane, K.: Decoherence suppression by quantum measurement reversal. Phys. Rev. A 81(81), 1334\u20131342 (2010)","journal-title":"Phys. Rev. A"},{"issue":"7","key":"6_CR18","doi-asserted-by":"publisher","first-page":"2236","DOI":"10.1007\/s10773-014-2024-x","volume":"53","author":"XW Guan","year":"2014","unstructured":"Guan, X.W., Chen, X.B., Wang, L.C.: Joint remote preparation of an arbitrary two-qubit state in noisy environments. Int. J. Theor. Phys. 53(7), 2236\u20132245 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Fortes, R., Rigolin, G.: Fighting noise with noise in realistic quantum teleportation. Phys. Rev. A 92(1), 012338 (2015)","DOI":"10.1103\/PhysRevA.92.012338"},{"issue":"11","key":"6_CR20","doi-asserted-by":"publisher","first-page":"4805","DOI":"10.1007\/s11128-016-1430-9","volume":"15","author":"MM Wang","year":"2016","unstructured":"Wang, M.M., Qu, Z.G.: Effect of quantum noise on deterministic joint remote state preparation of a qubit state via a GHZ channel. Quantum Inf. Process. 15(11), 4805\u20134818 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"6_CR21","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s11128-017-1594-y","volume":"16","author":"MM Wang","year":"2017","unstructured":"Wang, M.M., Qu, Z.G., Wang, W.: Effect of noise on deterministic joint remote preparation of an arbitrary two-qubit state. Quantum Inf. Process. 16(5), 140 (2017). UNSP","journal-title":"Quantum Inf. Process."},{"issue":"02","key":"6_CR22","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1142\/S0219749917500125","volume":"15","author":"MM Wang","year":"2017","unstructured":"Wang, M.M., Qu, Z.G., Wang, W., Chen, J.G.: Effect of noise on joint remote preparation of multi-qubit state. Int. J. Quantum Inf. 15(02), 175\u2013179 (2017)","journal-title":"Int. J. Quantum Inf."},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Yu, W., Cioffi, J.M.: FDMA capacity of Gaussian multiple-access channels with ISI. In: IEEE International Conference on Communications, vol. 50, no. 1, pp. 102\u2013111 (2002)","DOI":"10.1109\/26.975766"},{"key":"6_CR24","first-page":"129","volume":"13","author":"M Iri","year":"1971","unstructured":"Iri, M.: On an extension of the maximum flow minimum cut theorem to multicommodity flows. J. Oper. Res. Soc. Japan 13, 129\u2013135 (1971)","journal-title":"J. Oper. Res. Soc. Japan"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:25:40Z","timestamp":1563405940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}