{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T21:06:41Z","timestamp":1773263201542,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030322151","type":"print"},{"value":"9783030322168","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32216-8_28","type":"book-chapter","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T16:14:33Z","timestamp":1571847273000},"page":"288-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Quantum Key Distribution Protocol Based on the EPR Pairs and Its Simulation"],"prefix":"10.1007","author":[{"given":"Jian","family":"Li","sequence":"first","affiliation":[]},{"given":"Hengji","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chaoyang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Leilei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanyan","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Xiubo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yuguang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,24]]},"reference":[{"issue":"6","key":"28_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"P1","key":"28_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(P1), 7\u201311 (2014)","journal-title":"Theor. Comput. Sci."},{"issue":"1","key":"28_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5(1), 3\u201328 (1992)","journal-title":"J. Cryptol."},{"issue":"2","key":"28_CR4","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"28_CR5","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on bells theorem. Phys. Rev. Lett. 67(6), 661 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"28_CR6","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without bells theorem. Phys. Rev. Lett. 68(5), 557 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"28_CR7","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81(14), 3018 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"28767","DOI":"10.1038\/srep28767","volume":"6","author":"J Li","year":"2016","unstructured":"Li, J., Li, N., Li, L.L., Wang, T.: One step quantum key distribution based on EPR entanglement. Sci. Rep. 6, 28767 (2016)","journal-title":"Sci. Rep."},{"issue":"9","key":"28_CR9","doi-asserted-by":"publisher","first-page":"3785","DOI":"10.1007\/s11128-016-1359-z","volume":"15","author":"Q Wang","year":"2016","unstructured":"Wang, Q., Zhang, C.H., Luo, S., Guo, G.C.: An enhanced proposal on decoy-state measurement device-independent quantum key distribution. Quantum Inf. Process. 15(9), 3785\u20133797 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"28_CR10","doi-asserted-by":"publisher","first-page":"043003","DOI":"10.1088\/0031-8949\/91\/4\/043003","volume":"91","author":"A M\u00e1ttar","year":"2016","unstructured":"M\u00e1ttar, A., Ac\u00edn, A.: Implementations for device-independent quantum key distribution. Phys. Scr. 91(4), 043003 (2016)","journal-title":"Phys. Scr."},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"022332","DOI":"10.1103\/PhysRevA.94.022332","volume":"94","author":"S Kawakami","year":"2016","unstructured":"Kawakami, S., Sasaki, T., Koashi, M.: Security of the differential-quadrature-phase-shift quantum key distribution. Phys. Rev. A 94(2), 022332 (2016)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"28_CR12","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1364\/OPTICA.4.000163","volume":"4","author":"B Fr\u00f6hlich","year":"2017","unstructured":"Fr\u00f6hlich, B., et al.: Long-distance quantum key distribution secure against coherent attacks. Optica 4(1), 163\u2013167 (2017)","journal-title":"Optica"},{"issue":"4","key":"28_CR13","doi-asserted-by":"publisher","first-page":"042301","DOI":"10.1103\/PhysRevA.95.042301","volume":"95","author":"Y Hatakeyama","year":"2017","unstructured":"Hatakeyama, Y., Mizutani, A., Kato, G., Imoto, N., Tamaki, K.: Differential-phase-shift quantum-key-distribution protocol with a small number of random delays. Phys. Rev. A 95(4), 042301 (2017)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"28_CR14","doi-asserted-by":"publisher","first-page":"062313","DOI":"10.1103\/PhysRevA.95.062313","volume":"95","author":"WY Hwang","year":"2017","unstructured":"Hwang, W.Y., Su, H.Y., Bae, J.: Improved measurement-device-independent quantum key distribution with uncharacterized qubits. Phys. Rev. A 95(6), 062313 (2017)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"28_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/e19010004","volume":"19","author":"LA Lizama-P\u00e9rez","year":"2016","unstructured":"Lizama-P\u00e9rez, L.A., L\u00f3pez, J.M., De Carlos L\u00f3pez, E.: Quantum key distribution in the presence of the intercept-resend with faked states attack. Entropy 19(1), 4 (2016)","journal-title":"Entropy"},{"issue":"35","key":"28_CR16","doi-asserted-by":"publisher","first-page":"2922","DOI":"10.1016\/j.physleta.2017.07.015","volume":"381","author":"H Lai","year":"2017","unstructured":"Lai, H., Luo, M.X., Zhan, C., Pieprzyk, J., Orgun, M.A.: An improved coding method of quantum key distribution protocols based on fibonacci-valued oam entangled states. Phys. Lett. A 381(35), 2922\u20132926 (2017)","journal-title":"Phys. Lett. A"},{"issue":"05","key":"28_CR17","doi-asserted-by":"publisher","first-page":"1750040","DOI":"10.1142\/S021974991750040X","volume":"15","author":"D Pastorello","year":"2017","unstructured":"Pastorello, D.: A quantum key distribution scheme based on tripartite entanglement and violation of CHSH inequality. Int. J. Quantum Inf. 15(05), 1750040 (2017)","journal-title":"Int. J. Quantum Inf."},{"issue":"16","key":"28_CR18","doi-asserted-by":"publisher","first-page":"1393","DOI":"10.1016\/j.physleta.2017.01.058","volume":"381","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Bao, W.S., Bao, H.Z., Zhou, C., Jiang, M.S., Li, H.W.: High-dimensional quantum key distribution with the entangled single-photon-added coherent state. Phys. Lett. A 381(16), 1393\u20131397 (2017)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"28_CR19","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"18","key":"28_CR20","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"28_CR21","doi-asserted-by":"publisher","first-page":"054301","DOI":"10.1103\/PhysRevA.69.054301","volume":"69","author":"QY Cai","year":"2004","unstructured":"Cai, Q.Y., Li, B.W.: Improving the capacity of the bostr\u00f6m-felbinger protocol. Phys. Rev. A 69(5), 054301 (2004)","journal-title":"Phys. Rev. A"},{"issue":"25","key":"28_CR22","doi-asserted-by":"publisher","first-page":"5761","DOI":"10.1088\/0305-4470\/38\/25\/011","volume":"38","author":"T Gao","year":"2005","unstructured":"Gao, T., Yan, F.L., Wang, Z.X.: Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A: Math. Gen. 38(25), 5761 (2005)","journal-title":"J. Phys. A: Math. Gen."},{"issue":"4","key":"28_CR23","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s11128-009-0112-2","volume":"8","author":"A Chamoli","year":"2009","unstructured":"Chamoli, A., Bhandari, C.: Secure direct communication based on ping-pong protocol. Quantum Inf. Process. 8(4), 347\u2013356 (2009)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"28_CR24","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"28_CR25","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1088\/0256-307X\/21\/4\/003","volume":"21","author":"C Qing-Yu","year":"2004","unstructured":"Qing-Yu, C., Bai-Wen, L.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21(4), 601 (2004)","journal-title":"Chin. Phys. Lett."},{"issue":"14","key":"28_CR26","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"28_CR27","doi-asserted-by":"publisher","first-page":"44934","DOI":"10.1038\/srep44934","volume":"7","author":"D Jiang","year":"2017","unstructured":"Jiang, D., Chen, Y., Gu, X., Xie, L., Chen, L.: Deterministic secure quantum communication using a single d-level system. Sci. Rep. 7, 44934 (2017)","journal-title":"Sci. Rep."},{"issue":"11","key":"28_CR28","doi-asserted-by":"publisher","first-page":"4747","DOI":"10.1007\/s11128-016-1410-0","volume":"15","author":"AGAH Guerra","year":"2016","unstructured":"Guerra, A.G.A.H., Rios, F.F.S., Ramos, R.V.: Quantum secure direct communication of digital and analog signals using continuum coherent states. Quantum Inf. Process. 15(11), 4747\u20134758 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"28_CR29","doi-asserted-by":"publisher","first-page":"044305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Li, Y.S., Liu, X.S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71(4), 044305 (2005)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"28_CR30","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1002\/sec.711","volume":"8","author":"J Li","year":"2015","unstructured":"Li, J., Song, D., Li, R., Lu, X.: A quantum secure direct communication protocol based on four-qubit cluster state. Secur. Commun. Netw. 8(1), 36\u201342 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"10","key":"28_CR31","doi-asserted-by":"publisher","first-page":"6743","DOI":"10.3390\/e17106743","volume":"17","author":"J Li","year":"2015","unstructured":"Li, J., Pan, Z., Sun, F., Chen, Y., Wang, Z., Shi, Z.: Quantum secure direct communication based on dense coding and detecting eavesdropping with four-particle genuine entangled state. Entropy 17(10), 6743\u20136752 (2015)","journal-title":"Entropy"},{"issue":"3","key":"28_CR32","doi-asserted-by":"publisher","first-page":"030302","DOI":"10.1088\/1674-1056\/26\/3\/030302","volume":"26","author":"XL Zhao","year":"2017","unstructured":"Zhao, X.L., Li, J.L., Niu, P.H., Ma, H.Y., Ruan, D.: Two-step quantum secure direct communication scheme with frequency coding. Chin. Phys. B 26(3), 030302 (2017)","journal-title":"Chin. Phys. B"},{"issue":"1","key":"28_CR33","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.physleta.2004.06.009","volume":"328","author":"BA Nguyen","year":"2004","unstructured":"Nguyen, B.A.: Quantum dialogue. Phys. Lett. A 328(1), 6\u201310 (2004)","journal-title":"Phys. Lett. A"},{"issue":"6","key":"28_CR34","doi-asserted-by":"publisher","first-page":"2593","DOI":"10.1007\/s11128-016-1294-z","volume":"15","author":"H Wang","year":"2016","unstructured":"Wang, H., Zhang, Y.Q., Liu, X.F., Hu, Y.P.: Efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Inf. Process. 15(6), 2593\u20132603 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"28_CR35","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1109\/LCOMM.2016.2589263","volume":"20","author":"F Zarmehi","year":"2016","unstructured":"Zarmehi, F., Houshmand, M.: Controlled bidirectional quantum secure direct communication network using classical XOR operation and quantum entanglement. IEEE Commun. Lett. 20(10), 2071\u20132074 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"10","key":"28_CR36","doi-asserted-by":"publisher","first-page":"4313","DOI":"10.1007\/s11128-016-1370-4","volume":"15","author":"SH Kao","year":"2016","unstructured":"Kao, S.H., Hwang, T.: Controlled quantum dialogue robust against conspiring users. Quantum Inf. Process. 15(10), 4313\u20134324 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"28_CR37","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s11128-016-1461-2","volume":"16","author":"NR Zhou","year":"2017","unstructured":"Zhou, N.R., Li, J.F., Yu, Z.B., Gong, L.H., Farouk, A.: New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states. Quantum Inf. Process. 16(1), 4 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"28_CR38","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11128-017-1668-x","volume":"16","author":"ZH Liu","year":"2017","unstructured":"Liu, Z.H., Chen, H.W.: Cryptanalysis and improvement of efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Inf. Process. 16(9), 229 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"15","key":"28_CR39","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik, A.: Eavesdropping on the ping-pong quantum communication protocol. Phys. Rev. Lett. 90(15), 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"28_CR40","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1088\/1009-1963\/16\/2\/001","volume":"16","author":"D Fu-Guo","year":"2007","unstructured":"Fu-Guo, D., Xi-Han, L., Chun-Yan, L., Ping, Z., Hong-Yu, Z.: Eavesdropping on theping-pong\u2019quantum communication protocol freely in a noise channel. Chin. Phys. 16(2), 277 (2007)","journal-title":"Chin. Phys."},{"issue":"2","key":"28_CR41","first-page":"161","volume":"39","author":"F Gao","year":"2009","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.: Comparing the efficiency of different detection strategies of the ping-pong protocol. Sci. China Ser. G-Phys. Mech. Astron. 39(2), 161\u2013166 (2009)","journal-title":"Sci. China Ser. G-Phys. Mech. Astron."},{"key":"28_CR42","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1103\/PhysRevA.52.3457","volume":"52","author":"A Barenco","year":"2017","unstructured":"Barenco, A., Bennett, C.H., Cleve, R., et al.: Elementary gates for quantum computation. Phys. Rev. A 52, 3457 (2017)","journal-title":"Phys. Rev. A"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32216-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T16:19:39Z","timestamp":1571847579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32216-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030322151","9783030322168"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32216-8_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simutools.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"156","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"97","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}