{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T08:40:16Z","timestamp":1774428016844,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642544286","type":"print"},{"value":"9783642544293","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54429-3_7","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:33:06Z","timestamp":1394184786000},"page":"104-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Self-Testing Graph States"],"prefix":"10.1007","author":[{"given":"Matthew","family":"McKague","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Diestel, R.: Graph theory. In: Graduate Texts in Mathematics, vol. 173, 4th edn. Springer, Heidelberg. http:\/\/diestel-graph-theory.com\/ (2010)","DOI":"10.1007\/978-3-642-14279-6"},{"key":"7_CR2","first-page":"113","volume-title":"TQC 2010. LNCS","author":"M McKague","year":"2011","unstructured":"McKague, M., Mosca, M.: Generalized self-testing and the security of the 6-state protocol. In: van Dam, W., Kendon, V.M., Severini, S. (eds.) TQC 2010. LNCS, vol. 6519, pp. 113\u2013130. Springer, Heidelberg (2011)"},{"key":"7_CR3","first-page":"72","volume-title":"ICALP 2006. LNCS","author":"F Magniez","year":"2006","unstructured":"Magniez, F., Mayers, D., Mosca, M., Ollivier, H.: Self-testing of quantum circuits. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4051, pp. 72\u201383. Springer, Heidelberg (2006)"},{"issue":"4","key":"7_CR4","first-page":"273","volume":"4","author":"D Mayers","year":"2004","unstructured":"Mayers, D., Yao, A.: Self testing quantum apparatus. Quantum Inf. Comput. 4(4), 273\u2013286 (2004). (http:\/\/arxiv.org\/abs\/quant-ph\/0307205, http:\/\/www.rintonpress.com\/journals\/qiconline.html#v4n4)","journal-title":"Quantum Inf. Comput."},{"issue":"7291","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1038\/nature09008","volume":"464","author":"S Pironio","year":"2010","unstructured":"Pironio, S., Acin, A., Massar, S., Boyer de la Giroday, A., Matsukevich, D.N., Maunz, P., Olmschenk, S., Hayes, D., Luo, L., Manning, T.A., Monroe, C.: Random numbers certified by bell\u2019s theorem. Nature 464(7291), 1021\u20131024 (2010). doi:10.1038\/nature09008. (EPRINT aXiv:0911.3427)","journal-title":"Nature"},{"issue":"22","key":"7_CR6","doi-asserted-by":"publisher","first-page":"5188","DOI":"10.1103\/PhysRevLett.86.5188","volume":"86","author":"R. Raussendorf","year":"2001","unstructured":"Raussendorf, R., Briegel, H.J.: A one-way quantum computer. Phys. Rev. Lett. 86(22), 5188\u20135191 (2001). doi:10.1103\/PhysRevLett.86.5188. (EPRINT arxiv:quant-ph\/0010033)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"van Dam, W., Magniez, F., Mosca, M., Santha, M.: Self-testing of universal and fault-tolerant sets of quantum gates. In: STOC \u201900: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp. 688\u2013696. ACM, New York. (2000). doi:10.1145\/335305.335402. (EPRINT arxiv:quant-ph\/9904108)","DOI":"10.1145\/335305.335402"}],"container-title":["Lecture Notes in Computer Science","Theory of Quantum Computation, Communication, and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54429-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:13:16Z","timestamp":1676376796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54429-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642544286","9783642544293"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54429-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}