{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:48:34Z","timestamp":1725630514407},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1109\/conielecomp.2011.5749329","type":"proceedings-article","created":{"date-parts":[[2011,4,12]],"date-time":"2011-04-12T13:28:39Z","timestamp":1302614919000},"page":"316-321","source":"Crossref","is-referenced-by-count":1,"title":["An overview of quantum cryptography: Simulation"],"prefix":"10.1109","author":[{"given":"C. A.","family":"Diaz-Rodriguez","sequence":"first","affiliation":[]},{"given":"M.A.","family":"Olivares-Robles","sequence":"additional","affiliation":[]},{"given":"Arturo","family":"Juarez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199215706.001.0001"},{"year":"0","key":"ref6"},{"key":"ref11","first-page":"175","article-title":"Quantum Cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proceedings of the IEEE International Conference on Computers Systems and Signal Processing"},{"key":"ref5","first-page":"175","article-title":"Quantum cryptography: public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proceedings of the IEEE International Conference on Computers Systems and Signal Processing Bangalore India"},{"journal-title":"Simulation techniques for Quantum Information Theory and Quantum Cryptography","year":"2011","author":"rodr\u00edguez","key":"ref12"},{"journal-title":"Quantum Computation and Quantum Information","year":"2000","author":"nielsen","key":"ref8"},{"year":"0","key":"ref7"},{"journal-title":"A Brief Introduction of Quantum Cryptography for Engineers","year":"0","author":"qi","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"journal-title":"Event-by-event Simulation of Quantum Cryptography Protocols","year":"2007","author":"zhaol","key":"ref1"}],"event":{"name":"2011 21st International Conference on Electrical Communications and Computers (CONIELECOMP)","start":{"date-parts":[[2011,2,28]]},"location":"San Andres Cholula, Puebla, Mexico","end":{"date-parts":[[2011,3,2]]}},"container-title":["CONIELECOMP 2011, 21st International Conference on Electrical Communications and Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5741675\/5749308\/05749329.pdf?arnumber=5749329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:36:32Z","timestamp":1489768592000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5749329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/conielecomp.2011.5749329","relation":{},"subject":[],"published":{"date-parts":[[2011,2]]}}}