{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:41:40Z","timestamp":1725759700420},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642450075"},{"type":"electronic","value":"9783642450082"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45008-2_14","type":"book-chapter","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T21:12:40Z","timestamp":1385586760000},"page":"169-180","source":"Crossref","is-referenced-by-count":1,"title":["General Quantum Encryption Scheme Based on Quantum Memory"],"prefix":"10.1007","author":[{"given":"Marius","family":"Nagy","sequence":"first","affiliation":[]},{"given":"Naya","family":"Nagy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"21","key":"14_CR1","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters\u00a068(21), 3121\u20133124 (1992)","journal-title":"Physical Review Letters"},{"key":"14_CR2","first-page":"175","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179. IEEE, New York (1984)"},{"issue":"5","key":"14_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Physical Review Letters\u00a068(5), 557\u2013559 (1992)","journal-title":"Physical Review Letters"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A. Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell\u2019s theorem. Physical Review Letters\u00a067, 661\u2013663 (1991)","journal-title":"Physical Review Letters"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1038\/nature09662","volume":"469","author":"N. Gisin","year":"2011","unstructured":"Gisin, N., et al.: Quantum storage of photonic entanglement in a crystal. Nature\u00a0469, 508\u2013511 (2011)","journal-title":"Nature"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1126\/science.1220513","volume":"336","author":"M. Lukin","year":"2012","unstructured":"Lukin, M., et al.: Room-Temperature Quantum Bit Memory Exceeding One Second. Science\u00a0336, 1283\u20131286 (2012)","journal-title":"Science"},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1142\/S0129626407003058","volume":"17","author":"N. Nagy","year":"2007","unstructured":"Nagy, N., Akl, S.G.: Authenticated quantum key distribution without classical communication. Parallel Processing Letters, Special Issue on Unconventional Computational Problems\u00a017(3), 323\u2013335 (2007)","journal-title":"Parallel Processing Letters, Special Issue on Unconventional Computational Problems"},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method of obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"issue":"6086","key":"14_CR9","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1126\/science.1217635","volume":"336","author":"M. Steger","year":"2012","unstructured":"Steger, M., Saeedi, K., Thewalt, M.L.W., Morton, J.J.L., Riemann, H., Abrosimov, N.V., Becker, P., Pohl, H.J.: Quantum Information Storage for over 180s Using Donor Spins in a Si28 \u201cSemiconductor Vacuum\u201d. Science\u00a0336(6086), 1280\u20131283 (2012)","journal-title":"Science"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1038\/nature09719","volume":"469","author":"W. Tittel","year":"2011","unstructured":"Tittel, W., et al.: Broadband waveguide quantum memory for entangled photons. Nature\u00a0469, 512\u2013515 (2011)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Theory and Practice of Natural Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45008-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T18:02:12Z","timestamp":1558720932000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45008-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642450075","9783642450082"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45008-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}