{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:29:27Z","timestamp":1729650567105,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/cec.2012.6256432","type":"proceedings-article","created":{"date-parts":[[2012,8,6]],"date-time":"2012-08-06T20:51:10Z","timestamp":1344286270000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Deterministic secure quantum communication with mutual authentication based on bell measurement"],"prefix":"10.1109","author":[{"given":"Zhihao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hanwu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Xu","sequence":"additional","affiliation":[]},{"family":"Wenqian Li","sequence":"additional","affiliation":[]},{"family":"Zhigang Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.71.4287"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2010.5583945"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/28\/2\/020303"},{"key":"15","first-page":"532","article-title":"Revised quantum direct communication scheme with mutual authentication","volume":"26","author":"liu","year":"2010","journal-title":"Journal of Southeast University (English Edition)"},{"key":"16","doi-asserted-by":"crossref","first-page":"50306","DOI":"10.1088\/0256-307X\/27\/5\/050306","article-title":"A New Quantum Secure Direct Communication Scheme with Authentication","volume":"27","author":"liu","year":"2010","journal-title":"Chinese Physics Letters"},{"key":"13","doi-asserted-by":"crossref","first-page":"4105","DOI":"10.1088\/1674-1056\/18\/10\/007","article-title":"An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication","volume":"18","author":"liu","year":"2009","journal-title":"Chinese Physics B"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1088\/0253-6102\/54\/5\/10"},{"key":"11","doi-asserted-by":"crossref","first-page":"1838","DOI":"10.1088\/1009-1963\/16\/7\/005","article-title":"An efficient quantum secure direct communication scheme with authentication","volume":"16","author":"yang","year":"2007","journal-title":"Chinese Physics"},{"key":"12","doi-asserted-by":"crossref","first-page":"3860","DOI":"10.1088\/0256-307X\/25\/11\/007","article-title":"Quantum Secure Direct Communication Based on Authentication","volume":"25","author":"wang","year":"2008","journal-title":"Chinese Physics Letters"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/22\/1\/006"},{"key":"3","doi-asserted-by":"crossref","first-page":"357","DOI":"10.12693\/APhysPolA.101.357","article-title":"Secure communication with a publicly known key","volume":"101","author":"beige","year":"2002","journal-title":"Acta Physica Polonica A"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.80.3891"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"10","doi-asserted-by":"crossref","first-page":"376","DOI":"10.26421\/QIC9.5-6-2","article-title":"Quantum Direct Communication with Mutual Authentication","volume":"9","author":"yen","year":"2009","journal-title":"Quantum Information & Computation"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11467-007-0050-3"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.042317"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.187902"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.75.026301"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.042305"}],"event":{"name":"2012 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2012,6,10]]},"location":"Brisbane, Australia","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6241678\/6252855\/06256432.pdf?arnumber=6256432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T19:57:22Z","timestamp":1643140642000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6256432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cec.2012.6256432","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}