{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,26]],"date-time":"2026-04-26T07:18:56Z","timestamp":1777187936377,"version":"3.51.4"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,4,11]],"date-time":"2015-04-11T00:00:00Z","timestamp":1428710400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11128-015-0971-7","type":"journal-article","created":{"date-parts":[[2015,4,10]],"date-time":"2015-04-10T07:27:23Z","timestamp":1428650843000},"page":"2025-2042","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Correlations in $$n$$ n -local scenario"],"prefix":"10.1007","volume":"14","author":[{"given":"Kaushiki","family":"Mukherjee","sequence":"first","affiliation":[]},{"given":"Biswajit","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Debasis","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,11]]},"reference":[{"key":"971_CR1","doi-asserted-by":"crossref","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","volume":"98","author":"A Acin","year":"2007","unstructured":"Acin, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., Scarani, V.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR2","unstructured":"Mayers, D., Yao, A.: Unconditional security in quantum cryptography, In: Proceedings of the 39th IEEE Symposium on Foundations of Computer Science IEEE Computer Society, p. 503. Los Alamitos (1998)"},{"key":"971_CR3","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1038\/nature09008","volume":"464","author":"S Pironio","year":"2010","unstructured":"Pironio, S., Acin, A., Massar, S., de la Giroday, A.B., Matsukevich, D.N., Maunz, P., Olmschenk, S., Hayes, D., Luo, L., Manning, T.A., Monroe, C.: More randomness from noisy sources. Nature 464, 1021 (2010)","journal-title":"Nature"},{"key":"971_CR4","doi-asserted-by":"crossref","first-page":"095305","DOI":"10.1088\/1751-8113\/44\/9\/095305","volume":"44","author":"R Colbeck","year":"2011","unstructured":"Colbeck, R., Kent, A.: Private randomness expansion with untrusted devices. J. Phys. A Math. Theor. 44, 095305 (2011)","journal-title":"J. Phys. A Math. Theor."},{"key":"971_CR5","doi-asserted-by":"crossref","first-page":"250404","DOI":"10.1103\/PhysRevLett.106.250404","volume":"106","author":"J-D Bancal","year":"2011","unstructured":"Bancal, J.-D., Gisin, N., Liang, Y.-C., Pironio, S.: Device-independent witnesses of genuine multipartite entanglement. Phys. Rev. Lett. 106, 250404 (2011)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR6","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1103\/PhysRevA.56.1201","volume":"56","author":"R Cleve","year":"1997","unstructured":"Cleve, R., Buhrman, H.: Substituting quantum entanglement for communication. Phys. Rev. A 56, 1201 (1997)","journal-title":"Phys. Rev. A"},{"key":"971_CR7","doi-asserted-by":"crossref","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","volume":"98","author":"A Acin","year":"2007","unstructured":"Acin, A., et al.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR8","doi-asserted-by":"crossref","first-page":"5932","DOI":"10.1103\/PhysRevLett.81.5932","volume":"81","author":"H-J Briegel","year":"1998","unstructured":"Briegel, H.-J., et al.: Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR9","doi-asserted-by":"crossref","first-page":"5188","DOI":"10.1103\/PhysRevLett.86.5188","volume":"86","author":"R Raussendorf","year":"2001","unstructured":"Raussendorf, R., Briegel, H.J.: A one-way quantum computer. Phys. Rev. Lett. 86, 5188 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815676","volume-title":"Speakable and Unspeakable in Quantum Mechanics","author":"J Bell","year":"2004","unstructured":"Bell, J.: Speakable and Unspeakable in Quantum Mechanics, 2nd edn. Cambridge University Press, Cambridge (2004)","edition":"2"},{"key":"971_CR11","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","volume":"1","author":"JS Bell","year":"1964","unstructured":"Bell, J.S.: On the Einstein Podolsky Rosen paradox. Physics 1, 195 (1964)","journal-title":"Physics"},{"key":"971_CR12","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1103\/RevModPhys.82.1041","volume":"82","author":"K Hammerer","year":"2010","unstructured":"Hammerer, K., S\u00f8rensen, A.S., Polzik, E.S.: Quantum interface between light and atomic ensembles. Rev. Mod. Phys. 82, 1041 (2010)","journal-title":"Rev. Mod. Phys."},{"key":"971_CR13","doi-asserted-by":"crossref","first-page":"4287","DOI":"10.1103\/PhysRevLett.71.4287","volume":"71","author":"M Zukowski","year":"1993","unstructured":"Zukowski, M., et al.: Event-ready-detectors Bell experiment via entanglement swapping. Phys. Rev. Lett. 71, 4287 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR14","doi-asserted-by":"crossref","first-page":"170401","DOI":"10.1103\/PhysRevLett.104.170401","volume":"104","author":"C Branciard","year":"2010","unstructured":"Branciard, C., Gisin, N., Pironio, S.: Characterizing the nonlocal correlations created via entanglement swapping. Phys. Rev. Lett. 104, 170401 (2010)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR15","doi-asserted-by":"crossref","first-page":"103001","DOI":"10.1088\/1367-2630\/14\/10\/103001","volume":"14","author":"T Fritz","year":"2012","unstructured":"Fritz, T.: Beyond Bell\u2019s theorem: correlation scenarios. New J. Phys. 14, 103001 (2012)","journal-title":"New J. Phys."},{"key":"971_CR16","unstructured":"Fritz, T.: Beyond Bell\u2019s theorem II: scenarios with arbitrary causal structure, arXiv:1404.4812 (2014)"},{"key":"971_CR17","doi-asserted-by":"crossref","first-page":"113043","DOI":"10.1088\/1367-2630\/16\/11\/113043","volume":"16","author":"J Henson","year":"2014","unstructured":"Henson, J., Lal, R., Pusey, M.F.: Theory-independent limits on correlations from generalized Bayesian networks. New J. Phys. 16, 113043 (2014)","journal-title":"New J. Phys."},{"key":"971_CR18","doi-asserted-by":"crossref","first-page":"062109","DOI":"10.1103\/PhysRevA.90.062109","volume":"90","author":"A Tavakoli","year":"2014","unstructured":"Tavakoli, A., Skrzypczyk, P., Cavalcanti, D., Acin, A.: Nonlocal correlations in the star-network configuration. Phys. Rev. A 90, 062109 (2014)","journal-title":"Phys. Rev. A"},{"key":"971_CR19","doi-asserted-by":"crossref","first-page":"032119","DOI":"10.1103\/PhysRevA.85.032119","volume":"85","author":"C Branciard","year":"2012","unstructured":"Branciard, C., Rosset, D., Gisin, N., Pironio, S.: Bilocal versus non-bilocal correlations in entanglement swapping experiments. Phys. Rev. A 85, 032119 (2012)","journal-title":"Phys. Rev. A"},{"key":"971_CR20","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/S0375-9601(02)00428-0","volume":"297","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Gisin, B.: A local variable model for entanglement swapping exploiting the detection loophole. Phys. Lett. A 297, 279 (2002)","journal-title":"Phys. Lett. A"},{"key":"971_CR21","doi-asserted-by":"crossref","first-page":"022111","DOI":"10.1103\/PhysRevA.78.022111","volume":"78","author":"DM Greenberger","year":"2008","unstructured":"Greenberger, D.M., Horne, M., Zeilinger, A.: Bell theorem without inequalities for two particles. II. Inefficient detectors. Phys. Rev. A 78, 022111 (2008)","journal-title":"Phys. Rev. A"},{"key":"971_CR22","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1103\/PhysRevLett.23.880","volume":"23","author":"JF Clauser","year":"1969","unstructured":"Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880 (1969)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR23","doi-asserted-by":"crossref","first-page":"060401","DOI":"10.1103\/PhysRevLett.104.060401","volume":"104","author":"T Vertesi","year":"2010","unstructured":"Vertesi, T., Pironio, S., Brunner, N.: Closing the detection loophole in Bell experiments using qudits. Phys. Rev. Lett. 104, 060401 (2010)","journal-title":"Phys. Rev. Lett."},{"key":"971_CR24","volume-title":"Quantum Detection and Estimation Theory","author":"CW Helstrom","year":"1976","unstructured":"Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic Press, New York (1976)"},{"key":"971_CR25","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-0971-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-0971-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-0971-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T06:46:35Z","timestamp":1566542795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-0971-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,11]]},"references-count":25,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["971"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-0971-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,11]]}}}