{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:41:34Z","timestamp":1725759694900},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642450075"},{"type":"electronic","value":"9783642450082"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45008-2_15","type":"book-chapter","created":{"date-parts":[[2013,11,28]],"date-time":"2013-11-28T02:12:40Z","timestamp":1385604760000},"page":"181-192","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Secret Communication without an Encryption Key"],"prefix":"10.1007","author":[{"given":"Marius","family":"Nagy","sequence":"first","affiliation":[]},{"given":"Naya","family":"Nagy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","first-page":"175","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175\u2013179. IEEE, New York (1984)"},{"issue":"21","key":"15_CR2","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters\u00a068(21), 3121\u20133124 (1992)","journal-title":"Physical Review Letters"},{"issue":"03","key":"15_CR3","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1142\/S0129626410000193","volume":"20","author":"N. Nagy","year":"2010","unstructured":"Nagy, N., Nagy, M., Akl, S.G.: Key distribution versus key enhancement in quantum cryptography. Parallel Processing Letters\u00a020(03), 239\u2013250 (2010)","journal-title":"Parallel Processing Letters"},{"key":"15_CR4","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press (2000)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Lomonaco Jr., S.J.: A Talk on Quantum Cryptography or How Alice Outwits Eve. In: Proceedings of Symposia in Applied Mathematics, Washington, DC, vol.\u00a058, pp. 237\u2013264 (January 2002)","DOI":"10.1090\/psapm\/058\/1922901"},{"issue":"4","key":"15_CR6","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. Shannon","year":"1949","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal\u00a028(4), 656\u2013715 (1949)","journal-title":"Bell System Technical Journal"}],"container-title":["Lecture Notes in Computer Science","Theory and Practice of Natural Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45008-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T22:13:02Z","timestamp":1558735982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45008-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642450075","9783642450082"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45008-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}