{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:16Z","timestamp":1740123676095,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:00:00Z","timestamp":1574208000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:00:00Z","timestamp":1574208000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61601145"],"award-info":[{"award-number":["61601145"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571167"],"award-info":[{"award-number":["61571167"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471142"],"award-info":[{"award-number":["61471142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871157"],"award-info":[{"award-number":["61871157"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11036-019-01338-z","type":"journal-article","created":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T18:02:31Z","timestamp":1574272951000},"page":"1955-1974","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Control Code Multiple Encryption Algorithm on Satellite-to-ground Communication"],"prefix":"10.1007","volume":"24","author":[{"given":"Jinlong","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6952-4465","authenticated-orcid":false,"given":"Zhutian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhilu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yanyuan","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,20]]},"reference":[{"issue":"2","key":"1338_CR1","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1002\/sat.1169","volume":"35","author":"M Jia","year":"2017","unstructured":"Jia M, Liu X, Gu X, Guo Q (2017) Joint cooperative spectrum sensing and channel selection optimization for satellite communication systems based on cognitive radio. Int J Satell Commun Netw 35(2):139","journal-title":"Int J Satell Commun Netw"},{"issue":"9","key":"1338_CR2","doi-asserted-by":"crossref","first-page":"6348","DOI":"10.1109\/TWC.2018.2859394","volume":"17","author":"Y Chen","year":"2018","unstructured":"Chen Y, Zhao N, Ding Z, Alouini M (2018) Multiple UAVs as Relays: Multi-Hop Single Link Versus Multiple Dual-Hop Links. IEEE Trans Wirel Commun 17(9):6348","journal-title":"IEEE Trans Wirel Commun"},{"issue":"5","key":"1338_CR3","doi-asserted-by":"crossref","first-page":"2281","DOI":"10.1109\/TCOMM.2018.2792014","volume":"66","author":"N Zhao","year":"2018","unstructured":"Zhao N, Cheng F, Yu FR, Tang J, Chen Y, Gui G, Sari H (2018) Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment. IEEE Trans Commun 66(5):2281","journal-title":"IEEE Trans Commun"},{"issue":"7","key":"1338_CR4","doi-asserted-by":"crossref","first-page":"6732","DOI":"10.1109\/TVT.2018.2811942","volume":"67","author":"F Cheng","year":"2018","unstructured":"Cheng F, Zhang S, Li Z, Chen Y, Zhao N, Yu FR, Leung VCM (2018) UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells. IEEE Trans Veh Technol 67(7):6732","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"1338_CR5","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MWC.2016.1500108WC","volume":"23","author":"M Jia","year":"2016","unstructured":"Jia M, Gu X, Guo Q, Xiang W, Zhang N (2016) Broadband Hybrid Satellite-Terrestrial Communication Systems Based on Cognitive Radio toward 5G. IEEE Wirel Commun 23(6):96","journal-title":"IEEE Wirel Commun"},{"issue":"3","key":"1338_CR6","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1007\/s11277-017-4207-2","volume":"96","author":"Y Zhao","year":"2017","unstructured":"Zhao Y, Xie L, Chen H, Wang K (2017) Ergodic Channel Capacity Analysis of Downlink in the Hybrid Satellite-Terrestrial Cooperative System. Wirel Pers Commun 96(3):3799","journal-title":"Wirel Pers Commun"},{"key":"1338_CR7","doi-asserted-by":"crossref","unstructured":"Li M, Hong Y, Zeng C, Song Y, Zhang X (2018) Investigation on the UAV-to-satellite optical communication systems. IEEE J Select Areas Commun 36(99):1","DOI":"10.1109\/JSAC.2018.2864419"},{"issue":"4","key":"1338_CR8","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/JSAC.2018.2824360","volume":"36","author":"Y Cao","year":"2018","unstructured":"Cao Y, Zhao N, Yu FR, Jin M, Chen Y, Tang J, Leung VCM (2018) Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks. IEEE J Sel Areas Commun 36(4):905","journal-title":"IEEE J Sel Areas Commun"},{"issue":"5","key":"1338_CR9","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.physleta.2006.06.054","volume":"359","author":"FG Deng","year":"2006","unstructured":"Deng FG, Li XH, Li CY, Zhou P, Zhou HY (2006) Quantum secure direct communication network with Einstein Podolsky Rosen pairs. Phys Lett A 359(5):359","journal-title":"Phys Lett A"},{"issue":"4","key":"1338_CR10","first-page":"113","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng FG, Gui LL, Liu XS (2003) Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys Rev A 68(4):113","journal-title":"Phys Rev A"},{"issue":"17","key":"1338_CR11","doi-asserted-by":"crossref","first-page":"170502","DOI":"10.1103\/PhysRevLett.110.170502","volume":"110","author":"H Salih","year":"2013","unstructured":"Salih H, Li ZH, Al-Amri M, Zubairy MS (2013) Protocol for direct counterfactual quantum communication. Phys Rev Lett 110(17):170502","journal-title":"Phys Rev Lett"},{"issue":"1","key":"1338_CR12","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"F Gao","year":"2010","unstructured":"Gao F, Qin SJ, Wen QY, Zhu FC (2010) Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger Horne Zeilinger state. Opt Commun 283(1):192","journal-title":"Opt Commun"},{"issue":"7","key":"1338_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10773-016-2958-2","volume":"55","author":"S Patwardhan","year":"2016","unstructured":"Patwardhan S, Moulick SR, Panigrahi PK (2016) Efficient Controlled Quantum Secure Direct Communication Protocols. Int J Theor Phys 55(7):1","journal-title":"Int J Theor Phys"},{"issue":"1","key":"1338_CR14","first-page":"309","volume":"40","author":"WJ Liu","year":"2009","unstructured":"Liu WJ, Chen HW, Liu JF, Liu ZH (2009) Three-dimension single photon quantum secure direct communication based on mutual authentication. J Cent South Univ 40(1):309","journal-title":"J Cent South Univ"},{"issue":"3","key":"1338_CR15","first-page":"242","volume":"40","author":"P Zang","year":"2017","unstructured":"Zang P, Tulin YI, Song RY, Jiang Y, School HN (2017) Controlled Teleportation of 3 Particle GHZ State via 2 EPR Pairs. Journal of Anhui Normal University 40(3):242","journal-title":"Journal of Anhui Normal University"},{"issue":"3","key":"1338_CR16","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1088\/1674-1056\/26\/3\/030302","volume":"26","author":"X Zhao","year":"2017","unstructured":"Zhao X, Li J, Niu P, Ma H, Ruan D (2017) Two-step quantum secure direct communication scheme with frequency coding. Chin Phys B 26(3):231","journal-title":"Chin Phys B"},{"key":"1338_CR17","doi-asserted-by":"crossref","unstructured":"Tan X, Zhang X, Liang C (2014) Multi-party Quantum Secure Direct Communication. In: International Conference on P2P, pp 251\u2013255","DOI":"10.1109\/3PGCIC.2014.71"},{"issue":"10","key":"1338_CR18","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s11128-018-2013-8","volume":"17","author":"HW Li","year":"2018","unstructured":"Li HW, Xu ZM, Yin ZQ (2018) Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack. Quantum Inf Process 17(10):257","journal-title":"Quantum Inf Process"},{"issue":"4","key":"1338_CR19","doi-asserted-by":"crossref","first-page":"042103","DOI":"10.1103\/PhysRevA.91.042103","volume":"91","author":"M Howard","year":"2015","unstructured":"Howard M (2015) . Phys Rev A 91(4):042103","journal-title":"Phys Rev A"},{"issue":"11","key":"1338_CR20","doi-asserted-by":"crossref","first-page":"3441","DOI":"10.1007\/s10773-017-3507-3","volume":"56","author":"N Behzadi","year":"2017","unstructured":"Behzadi N, Ahansaz B (2017) Effects of Oscillatory Deformations on the Coherent and Incoherent Quantum Transport. Int J Theor Phys 56(11):3441","journal-title":"Int J Theor Phys"},{"issue":"2","key":"1338_CR21","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1007\/s11128-014-0872-1","volume":"14","author":"YG Yang","year":"2015","unstructured":"Yang YG, Sun SJ, Zhao QQ (2015) Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf Process 14(2):681","journal-title":"Quantum Inf Process"},{"issue":"4","key":"1338_CR22","doi-asserted-by":"crossref","first-page":"042335","DOI":"10.1103\/PhysRevA.97.042335","volume":"97","author":"SE Vinay","year":"2018","unstructured":"Vinay SE, Kok P (2018) Extended analysis of the Trojan-horse attack in quantum key distribution. Phys Rev A 97(4):042335","journal-title":"Phys Rev A"},{"issue":"1","key":"1338_CR23","doi-asserted-by":"crossref","first-page":"8403","DOI":"10.1038\/s41598-017-08279-1","volume":"7","author":"S Sajeed","year":"2017","unstructured":"Sajeed S, Minshull C, Jain N, Makarov V (2017) Invisible Trojan-horse attack. Sci Rep 7(1):8403","journal-title":"Sci Rep"},{"issue":"1","key":"1338_CR24","first-page":"1","volume":"5","author":"LI Hong-Xin","year":"2018","unstructured":"Hong-Xin LI, Chi YG, Han Y, Yan B, Wang W (2018) . Analysis on Photon-number-splitting Attack Against Decoy-state Quantum Key Distribution Schemes. Journal of Cryptologic Research 5(1):1","journal-title":"Analysis on Photon-number-splitting Attack Against Decoy-state Quantum Key Distribution Schemes. Journal of Cryptologic Research"},{"key":"1338_CR25","doi-asserted-by":"crossref","unstructured":"Kakkar A, Navarro JR, Schatz R, Pang X, Ozolins O, Nordwall F, Zibar D, Jacobsen G, Popov S (2017) Influence of lasers with non-white frequency noise on the design of coherent optical links. In: 2017 Optical Fiber Communications Conference and Exhibition, pp. 1\u20133","DOI":"10.1364\/OFC.2017.Th2A.55"},{"issue":"13","key":"1338_CR26","doi-asserted-by":"crossref","first-page":"15299","DOI":"10.1364\/OE.25.015299","volume":"25","author":"J Cao","year":"2017","unstructured":"Cao J, Zhao X, Liu W, Gu H (2017) Performance analysis of a coherent free space optical communication system based on experiment. Opt Express 25(13):15299","journal-title":"Opt Express"},{"issue":"5","key":"1338_CR27","first-page":"521","volume":"69","author":"F Deng","year":"2004","unstructured":"Deng F, Long G (2004) Secure direct communication with a quantum one-time pad. Physics 69(5):521","journal-title":"Physics"},{"issue":"4","key":"1338_CR28","doi-asserted-by":"crossref","first-page":"44305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C Wang","year":"2005","unstructured":"Wang C, Deng FG, Li YS, Liu XS, Long GL (2005) Quantum secure direct communication with high-dimension quantum superdense coding. Phys Rev A 71(4):44305","journal-title":"Phys Rev A"},{"issue":"1","key":"1338_CR29","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang C, Deng FG, Long GL (2005) Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state. Opt Commun 253(1):15","journal-title":"Opt Commun"},{"issue":"6890","key":"1338_CR30","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1038\/nature00784","volume":"417","author":"D Kielpinski","year":"2002","unstructured":"Kielpinski D, Monroe C, Wineland DJ (2002) Architecture for a large-scale ion-trap quantum computer. Nature 417(6890):709","journal-title":"Nature"},{"issue":"7047","key":"1338_CR31","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1038\/nature03804","volume":"436","author":"KM Birnbaum","year":"2005","unstructured":"Birnbaum KM, Boca A, Miller R, Boozer AD, Northup TE, Kimble HJ (2005) Photon blockade in an optical cavity with one trapped atom. Nature 436(7047):87","journal-title":"Nature"},{"issue":"C","key":"1338_CR32","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.adhoc.2016.05.012","volume":"58","author":"M Jia","year":"2017","unstructured":"Jia M, Liu X, Yin Z, Guo Q, Gu X (2017) Joint cooperative spectrum sensing and spectrum opportunity for satellite cluster communication networks. Ad Hoc Netw 58(C):231","journal-title":"Ad Hoc Netw"},{"issue":"9","key":"1338_CR33","doi-asserted-by":"crossref","first-page":"e16144","DOI":"10.1038\/lsa.2016.144","volume":"5","author":"JY Hu","year":"2016","unstructured":"Hu JY, Yu B, Jing MY, Xiao LT, Jia ST, Qin GQ, Long GL (2016) Experimental quantum secure direct communication with single photons. Light Science & Applications 5(9):e16144","journal-title":"Light Science & Applications"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01338-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01338-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01338-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T01:06:06Z","timestamp":1605747966000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01338-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,20]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1338"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01338-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2019,11,20]]},"assertion":[{"value":"20 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}