{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:19:37Z","timestamp":1730211577247,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527973","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T21:35:06Z","timestamp":1630964106000},"page":"530-535","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Cryptography in Maritime Telecommunications"],"prefix":"10.1109","author":[{"given":"Maria","family":"Papathanasaki","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Fountas","sequence":"additional","affiliation":[]},{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[]},{"given":"Mohamed Amine","family":"Ferrag","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6106-4_19"},{"article-title":"Quantum cryptography: Public key distribution and coin tossing","year":"2020","author":"bennett","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.10.041038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1119\/1.1463744"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11659-4_15"},{"key":"ref16","first-page":"10","article-title":"Quantum computing","author":"karafyllidis","year":"2015"},{"key":"ref17","first-page":"395","article-title":"Evaluation of quantum cryptanalysis on speck","author":"anand","year":"2020","journal-title":"International Conference on Cryptology in India"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102556"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/OCEANS.2015.7404356"},{"article-title":"Quantum cryptography: The ultimate solution to secure data transmission?","year":"0","author":"antoniades","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4031\/MTSJ.52.5.11"},{"key":"ref3","first-page":"42","article-title":"Securing maritime logistics and supply chain: The medusa and mitigate approaches","volume":"14","author":"papastergiou","year":"2017","journal-title":"Marit Interdiction Oper J"},{"key":"ref6","first-page":"2","article-title":"An introduction to quantum computers","author":"bolhasani","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00612-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6633\/aa7e1a"},{"year":"2020","key":"ref7","article-title":"Council resolution on encryption. security through encryption and security despite encryption"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41196-1_7"},{"key":"ref9","first-page":"269","article-title":"Computational cryptography","author":"pagourtzis","year":"2015"},{"article-title":"Threats, protection and attribution of cyber attacks on critical infrastructures","year":"2019","author":"maglaras","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1364\/AO.56.000543"},{"key":"ref22","first-page":"1","article-title":"Using quantum communications for maritime signal flags","volume":"22","author":"maria-carmen","year":"2019","journal-title":"Scientific Bulletin\" Mircea cel Batran\" Naval Academy"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/OCEANS.2015.7401974"},{"key":"ref24","first-page":"659","article-title":"Provide high altitude network by using project loon","volume":"4","author":"darokar","year":"2017","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3028247"},{"article-title":"Optical communication system using a high altitude tethered balloon","year":"2006","author":"badesha","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/2017JD026471"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2021,7,26]]},"location":"Rhodes, Greece","end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527973.pdf?arnumber=9527973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:44Z","timestamp":1652197544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527973\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527973","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}