{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:55:32Z","timestamp":1743123332281,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811617805"},{"type":"electronic","value":"9789811617812"}],"license":[{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:00:00Z","timestamp":1631232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-1781-2_69","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T15:05:30Z","timestamp":1631199930000},"page":"801-809","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["New Way to Generating and Simulation QKD"],"prefix":"10.1007","author":[{"given":"Hasan Abbas","family":"Al-Mohammed","sequence":"first","affiliation":[]},{"given":"Elias","family":"Yaacoub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"69_CR1","doi-asserted-by":"crossref","unstructured":"Bruss D, Erd\u00e9lyi G, Meyer T, Riege T, Rothe J (2007) Quantum cryptography: a survey ACM Comput Surv 39(2)","DOI":"10.1145\/1242471.1242474"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"Lohachab A, Lohachab A, Jangra A (2020) A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet of Things 9, p. 100174","DOI":"10.1016\/j.iot.2020.100174"},{"issue":"5","key":"69_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2018.3761713","volume":"16","author":"M Sasaki","year":"2018","unstructured":"Sasaki M (2018) Quantum key distribution and its applications. IEEE Secur Priv 16(5):42\u201348","journal-title":"IEEE Secur Priv"},{"key":"69_CR4","unstructured":"Editors F et al (2010) Applied Quantum Cryptography (Lecture Notes in Physics, 797). Springer Berlin Heidelberg"},{"key":"69_CR5","doi-asserted-by":"crossref","unstructured":"Muruganantham B, Shamili P, Ganesh Kumar S, Murugan A (2020) Quantum cryptography for secured communication networks. Int J Electr Comput Eng 10(1): 407\u2013414","DOI":"10.11591\/ijece.v10i1.pp407-414"},{"issue":"2","key":"69_CR6","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85(2):441\u2013444","journal-title":"Phys Rev Lett"},{"key":"69_CR7","unstructured":"M. E. System, \u201cusing OptSim,\u201d IEEE sponsere, Int. Conf. Electron. Commun. Syst. (ICECS 2015) Implement., no. Icecs, pp. 457\u2013460, 2015."},{"key":"69_CR8","first-page":"190","volume":"190","author":"HC Prithvik","year":"2020","unstructured":"Prithvik HC, Charan KR, Sachin BS, Rakesh KR (2020) \u201cImplementation of Quantum Key Distribution using Python\u201d, Wutan Huatan Jisuan Jishu, vol. XVI 190:190\u2013196","journal-title":"XVI"},{"key":"69_CR9","unstructured":"Quantum cryptography, Modelling Fuzzy Logic Quantum Key Distribution using Simulink, https:\/\/www.mathworks.com\/content\/dam\/mathworks\/mathworks-dot-com\/solutions\/automotive\/files\/in-expo-2015\/modelling-fuzzy-logic-quantum-key-distribution-using-simulink.pdf, last accessed 2021\/1\/19."},{"issue":"10","key":"69_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.23919\/JCC.2019.10.001","volume":"16","author":"H Zhang","year":"2019","unstructured":"Zhang H, Ji Z, Wang H, Wu W (2019) Survey on quantum information security. China Commun. 16(10):1\u201336","journal-title":"China Commun."},{"key":"69_CR11","doi-asserted-by":"publisher","first-page":"92687","DOI":"10.1109\/ACCESS.2020.2992820","volume":"8","author":"AAA El-Latif","year":"2020","unstructured":"El-Latif AAA et al (2020) Providing End-to-End Security Using Quantum Walks in IoT Networks. IEEE Access 8:92687\u201392696","journal-title":"IEEE Access"},{"key":"69_CR12","unstructured":"M. Mina and E. Simion, \u201cA Scalable Simulation of the BB84 Protocol Involving Eavesdropping,\u201d Cryptol. ePrint Arch., vol. 1, no. Report 2020\/1074, pp. 1\u201319, 2020."},{"issue":"2","key":"69_CR13","doi-asserted-by":"publisher","first-page":"01","DOI":"10.9790\/0661-162110109","volume":"16","author":"H Singh","year":"2014","unstructured":"Singh H, Gupta DL, Singh A (2014) Quantum Key Distribution Protocols: A Review. IOSR J. Comput. Eng. 16(2):01\u201309","journal-title":"IOSR J. Comput. Eng."},{"key":"69_CR14","doi-asserted-by":"crossref","unstructured":"Mavromatis A, Ntavou F, Salas EH, Kanellos GT, Nejabati R, Simeonidou D (2018) Experimental Demonstration of Quantum Key Distribution (QKD) for Energy-Efficient Software-Defined Internet of Things. Eur. Conf. Opt. Commun. ECOC, vol. 2018-Septe, no. 1, pp. 1\u20133","DOI":"10.1109\/ECOC.2018.8535267"},{"key":"69_CR15","unstructured":"QKD simulator, Homepage. https:\/\/www.qkdsimulator.com\/. Last accessed 19 Jan 2019"},{"key":"69_CR16","unstructured":"Viacheslav B (2015) Security Issues of quantum cryptographic systems with imperfect detectors. Doctoral Diss., vol 151,September 2016, pp. 1\u2013133"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1781-2_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T17:03:43Z","timestamp":1644339823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1781-2_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,10]]},"ISBN":["9789811617805","9789811617812"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1781-2_69","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,10]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}