{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T23:28:44Z","timestamp":1705188524830},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,4,9]],"date-time":"2011-04-09T00:00:00Z","timestamp":1302307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1007\/s11277-011-0293-8","type":"journal-article","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T05:57:28Z","timestamp":1302242248000},"page":"145-157","source":"Crossref","is-referenced-by-count":7,"title":["Standardization of Quantum Key Distribution in ETSI"],"prefix":"10.1007","volume":"58","author":[{"given":"Walter","family":"Weigel","sequence":"first","affiliation":[]},{"given":"Gaby","family":"Lenhart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,9]]},"reference":[{"key":"293_CR1","unstructured":"Alleaume, R., et\u00a0al. (2007). SECOQC white paper, quantum key distribution and cryptography."},{"key":"293_CR2","unstructured":"Renner, R. (2005). Security of quantum key distribution. PhD thesis, ETH Zurich (eprint quant-ph=0512258=)."},{"issue":"2","key":"293_CR3","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest R., Shamir A., Adleman L. (1978) A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2): 120\u2013126","journal-title":"Communications of the ACM"},{"key":"293_CR4","first-page":"109","volume":"XLV","author":"G. S. Vernam","year":"1926","unstructured":"Vernam G. S. (1926) Cipher printing telegraph system for secret wire and radio telegraph communications. Journal American Institute of Electrical Engineers XLV: 109\u2013115","journal-title":"Journal American Institute of Electrical Engineers"},{"issue":"4","key":"293_CR5","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"Shannon C. E. (1949) Communication theory of secrecy systems. Bell System Technical Journal 28(4): 656\u2013715","journal-title":"Bell System Technical Journal"},{"key":"293_CR6","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W. Wooters","year":"1982","unstructured":"Wooters W., Zurek W. (1982) Single quantum cannot be cloned. Nature 299: 802\u2013803","journal-title":"Nature"},{"key":"293_CR7","doi-asserted-by":"crossref","unstructured":"Schr\u00f6dinger, E. (1935). Die gegenw\u00e4rtige Situation in der Quantenmechanik, Naturwissenschaften, 23, 807 (823,844).","DOI":"10.1007\/BF01491987"},{"key":"293_CR8","unstructured":"Bennett, C. H., Brassard, G. (1984). Quantum cryptography: public key distribution and coin tossing. In (Proceedings of the IEEE international conference on computers, systems and signal processing). (pp. 175\u2013179) Bangalore, India"},{"key":"293_CR9","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin N., Ribordy G., Tittel W., Zbinden H. (2002) Quantum cryptography. Reviews of Modern Physics 74: 145","journal-title":"Reviews of Modern Physics"},{"key":"293_CR10","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1080\/09500340412331283633","volume":"52","author":"D. Collins","year":"2005","unstructured":"Collins D., Gisin N., Riedmatten H. (2005) Quantum relays for long distance quantum cryptography. Journal of Modern Optics 52: 735","journal-title":"Journal of Modern Optics"},{"key":"293_CR11","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1088\/1367-2630\/4\/1\/346","volume":"4","author":"C. Elliott","year":"2002","unstructured":"Elliott C. (2002) Building the quantum network. New Journal of Physics 4: 46","journal-title":"New Journal of Physics"},{"key":"293_CR12","doi-asserted-by":"crossref","unstructured":"Elliott, C. et\u00a0al. (2005). Current status of the darpa quantum network (eprint arxiv:quant-ph=0503058=).","DOI":"10.1117\/12.606489"},{"key":"293_CR13","doi-asserted-by":"crossref","unstructured":"Peev, M., Pacher, C., All\u00e9aume, R., Barreiro, C., Bouda, J., Boxleitner, W., et\u00a0al. (2009). The SECOQC quantum key distribution network in Vienna. New Journal of Physics, 11, 075001, 37\u00a0pp.","DOI":"10.1088\/1367-2630\/11\/7\/075001"},{"key":"293_CR14","unstructured":"Dodson, D., Fujiwara, M., Grangier, P., Hayashi, M., Imafuku, K., Kitayama, K.-I., et\u00a0al. (2009). UQC Report: \u201cUpdating Quantum Cryptography\u201d. Quantum physics; Cryptography and security. (available at http:\/\/arxiv.org\/abs\/0905.4325 )."},{"key":"293_CR15","unstructured":"Laenger, T., Soto Rodriguez, M., Peev, M., Alleaume, R., Mink, A., Lowans, B., et\u00a0al. (2010). ETSI GS QKD 002 V1.0.0. Use Cases."},{"key":"293_CR17","doi-asserted-by":"crossref","unstructured":"L\u00e4nger, T. & Lenhart, G. (2009) ETSI standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD. New Journal of Physics, 11, 055051, 16\u00a0pp.","DOI":"10.1088\/1367-2630\/11\/5\/055051"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-011-0293-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-011-0293-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-011-0293-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T17:04:57Z","timestamp":1560099897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-011-0293-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,9]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,5]]}},"alternative-id":["293"],"URL":"https:\/\/doi.org\/10.1007\/s11277-011-0293-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,9]]}}}