{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T05:42:50Z","timestamp":1680586970951},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2009,12,15]],"date-time":"2009-12-15T00:00:00Z","timestamp":1260835200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s11128-009-0157-2","type":"journal-article","created":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T14:16:12Z","timestamp":1260800172000},"page":"693-698","source":"Crossref","is-referenced-by-count":12,"title":["Comment on: \u201csecure direct communication based on ping-pong protocol\u201d [Quantum Inf. Process. 8, 347 (2009)]"],"prefix":"10.1007","volume":"9","author":[{"given":"Mosayeb","family":"Naseri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,15]]},"reference":[{"key":"157_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, pp. 175\u2013179. IEEE, New York (1984)"},{"key":"157_CR2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A. Ekert","year":"1991","unstructured":"Ekert A.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"157_CR3","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C. H. Bennett","year":"1992","unstructured":"Bennett C. H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"157_CR4","volume-title":"Quantum computation and quantum information","author":"M. A. Nielsen","year":"2000","unstructured":"Nielsen M. A., Chuang I. L.: Quantum computation and quantum information. Cambridge University Press, Cambridge (2000)"},{"key":"157_CR5","doi-asserted-by":"crossref","first-page":"357","DOI":"10.12693\/APhysPolA.101.357","volume":"101","author":"A. Beige","year":"2002","unstructured":"Beige A., Engler B. G., Kurtsiefer C., Weinfurter H.: Secure communication with a publicly known key. Acta. Phys. Pol. A 101, 357 (2002)","journal-title":"Acta. Phys. Pol. A"},{"key":"157_CR6","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K. Bostrom","year":"2002","unstructured":"Bostrom K., Felbinger T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"157_CR7","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.physleta.2004.06.009","volume":"328","author":"B. A. Nguyen","year":"2004","unstructured":"Nguyen B. A.: Quantum dialogue. Phys. Lett. A 328, 6\u201310 (2004)","journal-title":"Phys. Lett. A"},{"key":"157_CR8","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.optcom.2007.03.031","volume":"275","author":"X.J. Wen","year":"2007","unstructured":"Wen X.J. et\u00a0al.: Secure quantum telephone . Opt. Commun. 275, 278\u2013282 (2007)","journal-title":"Opt. Commun."},{"key":"157_CR9","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1016\/j.optcom.2009.02.033","volume":"282","author":"Y. Sun","year":"2009","unstructured":"Sun Y. et\u00a0al.: Improving the security of secure quantum telephone against an attack with fake particles and local operations. Opt. Commun. 282, 2278\u20132280 (2009). doi: 10.1016\/j.optcom.2009.02.033","journal-title":"Opt. Commun."},{"key":"157_CR10","doi-asserted-by":"crossref","first-page":"3375","DOI":"10.1016\/j.optcom.2009.05.012","volume":"282","author":"M. Naseri","year":"2009","unstructured":"Naseri M.: Eavesdropping on secure quantum telephone protocol with dishonest server. Opt. Commun. 282, 3375\u20133378 (2009). doi: 10.1016\/j.optcom.2009.05.012","journal-title":"Opt. Commun."},{"key":"157_CR11","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.physleta.2006.01.035","volume":"354","author":"X. R. Jin","year":"2006","unstructured":"Jin X. R. et\u00a0al.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354, 67 (2006)","journal-title":"Phys. Lett. A"},{"key":"157_CR12","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1088\/0256-307X\/23\/7\/006","volume":"23","author":"F. G. Deng","year":"2006","unstructured":"Deng F. G. et\u00a0al.: Multiparty quantum secret report. Chin. Phys. Lett. 23, 1676\u20131679 (2006)","journal-title":"Chin. Phys. Lett."},{"key":"157_CR13","doi-asserted-by":"crossref","first-page":"1939","DOI":"10.1016\/j.optcom.2009.01.026","volume":"282","author":"M. Naseri","year":"2009","unstructured":"Naseri M.: Secure quantum sealed-bid auction. Opt. Commun. 282, 1939\u20131943 (2009)","journal-title":"Opt. Commun."},{"key":"157_CR14","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/s11128-009-0112-2","volume":"8","author":"A. Chamoli","year":"2009","unstructured":"Chamoli A., Bhandari C. M.: Secure direct communication based on ping-pong protocol. Quantum Inf. Process. 8, 347 (2009)","journal-title":"Quantum Inf. Process."},{"key":"157_CR15","first-page":"1354","volume":"49","author":"X. H. Li","year":"2006","unstructured":"Li X. H. et\u00a0al.: Deterministic secure quantum communication without maximally entangled states. J. Korean Phys. Soc. 49, 1354 (2006)","journal-title":"J. Korean Phys. Soc."},{"key":"157_CR16","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1088\/0256-307X\/22\/5\/006","volume":"22","author":"C. Y. Li","year":"2005","unstructured":"Li C. Y. et\u00a0al.: Secure quantum key distribution network with Bell states and local unitary operations. Chin. Phys. Lett. 22, 1049\u20131052 (2005)","journal-title":"Chin. Phys. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-009-0157-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-009-0157-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-009-0157-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:36:28Z","timestamp":1559360188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-009-0157-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,15]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["157"],"URL":"https:\/\/doi.org\/10.1007\/s11128-009-0157-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12,15]]}}}