{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:26:56Z","timestamp":1747290416814,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031737084"},{"type":"electronic","value":"9783031737091"}],"license":[{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T00:00:00Z","timestamp":1728432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73709-1_9","type":"book-chapter","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T10:12:01Z","timestamp":1728382321000},"page":"132-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Testing Quantum Processes"],"prefix":"10.1007","author":[{"given":"Lorenzo","family":"Ceragioli","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Gadducci","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Lomurno","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Tedeschi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,9]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theoret. Comput. Sci."},{"key":"9_CR2","unstructured":"Bernardi, G., Castellani, I., Laforgue, P., Stefanesco, L.: Constructive characterisations of the must-preorder for asynchrony (2024). https:\/\/hal.science\/hal-04642776"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Bernardo, M., Nicola, R.D., Loreti, M.: Revisiting trace and testing equivalences for nondeterministic and probabilistic processes. Logic. Methods Comput. Sci. 10(1) (2014)","DOI":"10.2168\/LMCS-10(1:16)2014"},{"key":"9_CR4","unstructured":"Caleffi, M., Cacciapuoti, A.S., Bianchi, G.: Quantum internet: from communication to distributed computing! In: Benediktsson, J.A., Dressler, F. (eds.) NANOCOM 2018. pp. 3:1\u20133:4. ACM (2018)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Ceragioli, L., Gadducci, F., Lomurno, G., Tedeschi, G.: Quantum bisimilarity via barbs and contexts: curbing the power of non-deterministic observers. Proc. ACM Program. Lang. 8(POPL), 43:1269\u201343:1297 (2024)","DOI":"10.1145\/3632885"},{"key":"9_CR6","unstructured":"Davidson, T.A.: Formal Verification Techniques Using Quantum Process Calculus. Ph.D. thesis, University of Warwick (2012)"},{"key":"9_CR7","unstructured":"De Nicola, R.: Testing Equivalences and Fully Abstract Models for Communicating Systems. Ph.D. thesis, University of Edinburgh, UK (1986)"},{"issue":"1\u20132","key":"9_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0304-3975(84)90113-0","volume":"34","author":"R De Nicola","year":"1984","unstructured":"De Nicola, R., Hennessy, M.: Testing equivalences for processes. Theoret. Comput. Sci. 34(1\u20132), 83\u2013133 (1984)","journal-title":"Theoret. Comput. Sci."},{"key":"9_CR9","unstructured":"Deng, Y.: Bisimulations for probabilistic and quantum processes. In: Schewe, S., Zhang, L. (eds.) CONCUR 2018. LIPIcs, vol.\u00a0118, pp. 2:1\u20132:14. Schloss Dagstuhl\u2013Leibniz-Zentrum f\u00fcr Informatik (2018)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-33475-7_9","volume-title":"Theoretical Computer Science","author":"Y Deng","year":"2012","unstructured":"Deng, Y., Feng, Y.: Open bisimulation for quantum processes. In: Baeten, J.C.M., Ball, T., de Boer, F.S. (eds.) TCS 2012. LNCS, vol. 7604, pp. 119\u2013133. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33475-7_9"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Feng, Y., Duan, R., Ying, M.: Bisimulation for quantum processes. ACM Trans. Program. Lang. Syst. 34(4), 17:1\u201317:43 (2012)","DOI":"10.1145\/2400676.2400680"},{"key":"9_CR12","unstructured":"Feng, Y., Ying, M.: Toward automatic verification of quantum cryptographic protocols. In: Aceto, L., de\u00a0Frutos\u00a0Escrig, D. (eds.) CONCUR 2015. LIPIcs, vol.\u00a042, pp. 441\u2013455. Schloss Dagstuhl\u2013Leibniz-Zentrum f\u00fcr Informatik (2015)"},{"issue":"7","key":"9_CR13","doi-asserted-by":"publisher","first-page":"70301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S., Huang, W., Wen, Q.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Gay, S.J., Nagarajan, R.: Communicating quantum processes. In: Palsberg, J., Abadi, M. (eds.) POPL 2005, pp. 145\u2013157. ACM (2005)","DOI":"10.1145\/1040305.1040318"},{"key":"9_CR15","unstructured":"van Glabbeek, R.J.: The linear time-branching time spectrum I. the semantics of concrete, sequential processes. In: Bergstra, J., Ponse, A., Smolka, S. (eds.) Handbook of Process Algebra, pp. 2\u201399. Elsevier (2001)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Jim\u00e9nez-Pastor, A., Larsen, K.G., Tribastone, M., Tschaikowski, M.: Forward and backward constrained bisimulations for quantum circuits. In: Finkbeiner, B., Kov\u00e1cs, L. (eds.) TACAS 2024. LNCS, vol. 14571, pp. 343\u2013362. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-57249-4_17"},{"key":"9_CR17","unstructured":"Kubota, T., Kakutani, Y., Kato, G., Kawano, Y., Sakurada, H.: Application of a process calculus to security proofs of quantum protocols. In: Arabnia, H.R., Gravvanis, G.A., Solo, A.M.G. (eds.) FCS 2012, pp. 141\u2013147. CSREA Press (2012)"},{"issue":"3","key":"9_CR18","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1017\/S096012950600524X","volume":"16","author":"M Lalire","year":"2006","unstructured":"Lalire, M.: Relations among quantum processes: bisimilarity and congruence. Math. Struct. Comput. Sci. 16(3), 407\u2013428 (2006)","journal-title":"Math. Struct. Comput. Sci."},{"key":"9_CR19","unstructured":"Lalire, M., Jorrand, P.: A process algebraic approach to concurrent and distributed quantum computation: operational semantics. arXiv preprint arXiv:quant-ph\/0407005 (2004)"},{"issue":"1","key":"9_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(91)90030-6","volume":"94","author":"KG Larsen","year":"1991","unstructured":"Larsen, K.G., Skou, A.: Bisimulation through probabilistic testing. Inf. Comput. 94(1), 1\u201328 (1991)","journal-title":"Inf. Comput."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Long, G.L., Deng, F.G., Wang, C., Li, X.H., Wen, K., Wang, W.Y.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2(3), 251\u2013272 (2007)","DOI":"10.1007\/s11467-007-0050-3"},{"issue":"3","key":"9_CR22","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48(3), 351\u2013406 (2001)","journal-title":"J. ACM"},{"key":"9_CR23","unstructured":"Mousavi, M.R., Peters, K., Schmitt, A.: Towards a formal testing theory for quantum processes. In: This volume"},{"key":"9_CR24","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press (2010)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Nurhadi, A.I., Syambas, N.R.: Quantum key distribution (QKD) protocols: a survey. In: ICWT 2018, pp.\u00a01\u20135. IEEE (2018)","DOI":"10.1109\/ICWT.2018.8527822"},{"issue":"10","key":"9_CR26","doi-asserted-by":"publisher","first-page":"3436","DOI":"10.1007\/s10773-019-04216-2","volume":"58","author":"Y Wang","year":"2019","unstructured":"Wang, Y.: Probabilistic process algebra to unifying quantum and classical computing in closed systems. Theor. Phys. 58(10), 3436\u20133509 (2019)","journal-title":"Theor. Phys."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Yi, W., Larsen, K.G.: Testing probabilistic and nondeterministic processes. In: Jr., R.J.L., Uyar, M.\u00dc. (eds.) PSTV 1992. IFIP Transactions, vol.\u00a0C-8, pp. 47\u201361. North-Holland (1992)","DOI":"10.1016\/B978-0-444-89874-6.50010-6"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-030-90870-6_2","volume-title":"Formal Methods","author":"M Ying","year":"2021","unstructured":"Ying, M.: Model checking for verification of quantum circuits. In: Huisman, M., P\u0103s\u0103reanu, C., Zhan, N. (eds.) FM 2021. LNCS, vol. 13047, pp. 23\u201339. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90870-6_2"},{"issue":"1","key":"9_CR29","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MWC.012.2200295","volume":"31","author":"P Zhang","year":"2024","unstructured":"Zhang, P., Chen, N., Shen, S., Yu, S., Wu, S., Kumar, N.: Future quantum communications and networking: a review and vision. IEEE Wirel. Commun. 31(1), 141\u2013148 (2024)","journal-title":"IEEE Wirel. Commun."}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. REoCAS Colloquium in Honor of Rocco De Nicola"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73709-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:04:58Z","timestamp":1729674298000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73709-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,9]]},"ISBN":["9783031737084","9783031737091"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73709-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,9]]},"assertion":[{"value":"9 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isola-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}