{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:47:18Z","timestamp":1725490038697},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735533"},{"type":"electronic","value":"9783540735540"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73554-0_13","type":"book-chapter","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T13:27:13Z","timestamp":1187789233000},"page":"127-136","source":"Crossref","is-referenced-by-count":3,"title":["Quantum Authenticated Key Distribution"],"prefix":"10.1007","author":[{"given":"Naya","family":"Nagy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Selim G.","family":"Akl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"21","key":"13_CR1","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters\u00a068(21), 3121\u20133124 (1992)","journal-title":"Physical Review Letters"},{"key":"13_CR2","first-page":"175","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179. IEEE, New York (December 1984)"},{"issue":"5","key":"13_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, D.N.: Quantum cryptography without Bell\u2019s theorem. Physical Review Letters\u00a068(5), 557\u2013559 (1992)","journal-title":"Physical Review Letters"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A. Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell\u2019s theorem. Physical Review Letters\u00a067, 661\u2013663 (1991)","journal-title":"Physical Review Letters"},{"key":"13_CR5","unstructured":"Nagy, M., Akl, S.G.: Quantum key distribution revisited. Technical Report 2006-516, School of Computing, Queen\u2019s University, Kingston, Ontario (June 2006)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Nagy, N., Akl, S.G.: Authenticated quantum key distribution without classical communication. In: Workshop on Unconventional Computational Problems, Sixth International Conference on Unconventional Computation, Kingston, Ontario (August 2007)","DOI":"10.1142\/S0129626407003058"},{"key":"13_CR7","volume-title":"Quantum Computation and Quantum Information","author":"M.A. Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, UK (2000)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Lomonaco, Jr., S.J.: A Talk on Quantum Cryptography or How Alice Outwits Eve. In: Proceedings of Symposia in Applied Mathematics, vol.\u00a058, pp. 237\u2013264. Washington, DC (January 2002)","DOI":"10.1090\/psapm\/058\/1922901"},{"issue":"2-3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0375-9601(01)00129-3","volume":"281","author":"B.-S. Shi","year":"2001","unstructured":"Shi, B.-S., Li, J., Liu, J.-M., Fan, X.-F., Guo, G.-C.: Quantum key distribution and quantum authentication based on entangled states. Physics Letters A\u00a0281(2-3), 83\u201387 (2001)","journal-title":"Physics Letters A"}],"container-title":["Lecture Notes in Computer Science","Unconventional Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73554-0_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:51:29Z","timestamp":1619517089000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73554-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735533","9783540735540"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73554-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}