{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:37:33Z","timestamp":1742387853421},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T00:00:00Z","timestamp":1430784000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s11128-015-1002-4","type":"journal-article","created":{"date-parts":[[2015,5,4]],"date-time":"2015-05-04T03:37:00Z","timestamp":1430710620000},"page":"2617-2633","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A quantum optical firewall based on simple quantum devices"],"prefix":"10.1007","volume":"14","author":[{"given":"H.","family":"Amellal","sequence":"first","affiliation":[]},{"given":"A.","family":"Meslouhi","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Hassouni","sequence":"additional","affiliation":[]},{"given":"M.","family":"El Baz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,5]]},"reference":[{"key":"1002_CR1","volume-title":"The Principles of Quantum Mechanics","author":"PAM Dirac","year":"1947","unstructured":"Dirac, P.A.M.: The Principles of Quantum Mechanics, 3rd edn. Clarendon Press, Oxford (1947)","edition":"3"},{"key":"1002_CR2","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802\u2013803 (1982). doi: 10.1038\/299802a0","journal-title":"Nature"},{"issue":"6","key":"1002_CR3","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/0375-9601(82)90084-6","volume":"92","author":"D Dieks","year":"1982","unstructured":"Dieks, D.: Communication by EPR devices. Phys. Lett. A 92(6), 271\u2013272 (1982)","journal-title":"Phys. Lett. A"},{"key":"1002_CR4","doi-asserted-by":"crossref","first-page":"9388","DOI":"10.1364\/OE.15.009388","volume":"15","author":"L-A Linares","year":"2007","unstructured":"Linares, L.-A., Kurtsiefer, C.: Breaking a quantum key distribution system through a timing side channel. Opt. Express 15, 9388\u20139393 (2007)","journal-title":"Opt. Express"},{"key":"1002_CR5","doi-asserted-by":"crossref","first-page":"065001","DOI":"10.1088\/1367-2630\/11\/6\/065001","volume":"11","author":"S Nauerth","year":"2009","unstructured":"Nauerth, S., F\u00fcrst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace BB84 quantum cryptography. New J. Phys. 11, 065001 (2009)","journal-title":"New J. Phys."},{"key":"1002_CR6","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)","journal-title":"Phys. Rev. A"},{"key":"1002_CR7","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1002_CR8","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"1002_CR9","first-page":"73,2","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi, B., Fung, C.-H.F., Lo, H.-K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quant. Inf. Comp. 7, 73,2 (2007)","journal-title":"Quant. Inf. Comp."},{"key":"1002_CR10","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1080\/09500340410001730986","volume":"52","author":"V Makarov","year":"2005","unstructured":"Makarov, V., Hjelme, D.R.: Faked states attack on quantum cryptosystems. J. Mod. Opt. 52, 691\u2013705 (2005)","journal-title":"J. Mod. Opt."},{"key":"1002_CR11","doi-asserted-by":"crossref","first-page":"022313","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V Makarov","year":"2006","unstructured":"Makarov, V., Anisimov, A., Skaar, J.: Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 74, 022313 (2006)","journal-title":"Phys. Rev. A"},{"key":"1002_CR12","doi-asserted-by":"crossref","first-page":"065003","DOI":"10.1088\/1367-2630\/11\/6\/065003","volume":"11","author":"V Makarov","year":"2009","unstructured":"Makarov, V.: Controlling passively quenched single photon detectors by bright light. New J. Phys. 11, 065003 (2009)","journal-title":"New J. Phys."},{"key":"1002_CR13","doi-asserted-by":"crossref","first-page":"042333","DOI":"10.1103\/PhysRevA.78.042333","volume":"78","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Fung, C.-H.F., Qi, B., Chen, C., Lo, H.-K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key- distribution systems. Phys. Rev. A 78, 042333 (2008)","journal-title":"Phys. Rev. A"},{"issue":"9","key":"1002_CR14","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1109\/TPDS.2007.70802","volume":"19","author":"AX Liu","year":"2008","unstructured":"Liu, A.X., Gouda, M.G.: Diverse firewall design. Parallel Distrib. Syst. IEEE Trans. 19(9), 1237\u20131251 (2008). doi: 10.1109\/TPDS.2007.70802","journal-title":"Parallel Distrib. Syst. IEEE Trans."},{"key":"1002_CR15","doi-asserted-by":"crossref","unstructured":"Jou, Y.F., Gong, F., Sargor, C., Wu, X.: Design and implementation of a scalable intrusion detection system for the protection of network infrastructure. DARPA Information Survivability Conference and Exposition, 2000. DISCEX \u201900. Proceedings (IEEE Transactions), 2, 69\u201383 (2000). doi: 10.1109\/DISCEX.2000.821510","DOI":"10.1109\/DISCEX.2000.821510"},{"key":"1002_CR16","doi-asserted-by":"crossref","unstructured":"Kollmitzer, C., Pivk, M. (eds.): Applied Quantum Cryptography, Lecture Notes in Physics, vol. 797. Springer, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-04831-9"},{"key":"1002_CR17","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179. IEEE, New York (1984)"},{"issue":"5","key":"1002_CR18","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 68(5), 557\u2013559 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"1002_CR19","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1002_CR20","first-page":"431, 58","volume":"7","author":"HL Lo","year":"2007","unstructured":"Lo, H.L., Preskill, J.: Security of quantum key distribution using weak coherent states with nonrandom phases. Quant. Inf. Comp. 7, 431, 58 (2007)","journal-title":"Quant. Inf. Comp."},{"key":"1002_CR21","doi-asserted-by":"crossref","first-page":"022304","DOI":"10.1103\/PhysRevA.74.022304","volume":"74","author":"E Andersson","year":"2007","unstructured":"Andersson, E., Curty, M., Jex, I.: Experimentally realizable quantum comparison of coherent states and its applications. Phys. Rev. A 74, 022304 (2007). 2006","journal-title":"Phys. Rev. A"},{"key":"1002_CR22","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/0375-9601(87)90222-2","volume":"123","author":"ID Ivanovic","year":"1987","unstructured":"Ivanovic, I.D.: Phys. Lett. A 123, 257 (1987)","journal-title":"Phys. Lett. A"},{"key":"1002_CR23","doi-asserted-by":"crossref","unstructured":"El Allati, A., El Baz, M.: Opt. Quant. Electron. doi: 10.1007\/s11082-014-9959-2","DOI":"10.1007\/s11082-014-9959-2"},{"key":"1002_CR24","doi-asserted-by":"crossref","first-page":"065002","DOI":"10.1088\/0031-8949\/83\/06\/065002","volume":"83","author":"A Allati","year":"2011","unstructured":"Allati, A., Hassouni, Y., Metwally, N.: Phys. Scr. 83, 065002 (2011)","journal-title":"Phys. Scr."},{"key":"1002_CR25","doi-asserted-by":"crossref","unstructured":"Meslouhi, A., Amellal, H., Hassouni, Y., El Allati, A.: J. Russian Laser Res. doi: 10.1007\/s10946-014-9438-z","DOI":"10.1007\/s10946-014-9438-z"},{"key":"1002_CR26","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s11128-010-0213-y","volume":"10","author":"A Allati","year":"2011","unstructured":"Allati, A., Baz, M., Hassouni, Y.: Quant. Inf. Process. 10, 589 (2011)","journal-title":"Quant. Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1002-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1002-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1002-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:21Z","timestamp":1559374761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1002-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,5]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["1002"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1002-4","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,5]]}}}