{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:21:53Z","timestamp":1755224513471,"version":"3.43.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/ecai.2017.8166458","type":"proceedings-article","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T18:31:59Z","timestamp":1512671519000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid scheme for secure communications using quantum and classical mechanisms"],"prefix":"10.1109","author":[{"given":"Mihail-Iulian","family":"Ple\u015fa","sequence":"first","affiliation":[{"name":"Computer Science Dept. Military Technical Academy Bucharest, Romania"}]}],"member":"263","reference":[{"key":"ref10","article-title":"The Number Field Sieve-Carl Pomerance","volume":"48","year":"1994","journal-title":"Proceedings of Symposia in Applied Mathematics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref14","first-page":"62","volume":"560","year":"2014","journal-title":"Using quantum key distribution for cryptographic purposes a survey-Romain All&#x00E9;aume-Theoretical Computer Science"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"key":"ref4","first-page":"1484","article-title":"Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer-Peter Shor SIAM","volume":"26","year":"1997","journal-title":"Sci Stat Comput"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/BF02650179","volume":"21","author":"feynman","year":"1982","journal-title":"International Journal of Theoretical Physics"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"journal-title":"Quantum copying Beyond the no-cloning theorem","year":"0","author":"buzek","key":"ref8"},{"journal-title":"Quantum Cryptography-Richard J Hughes LA-UR-95-806","year":"0","key":"ref7"},{"journal-title":"IBM Q experience","year":"0","key":"ref2"},{"journal-title":"Quantum Computation and Quantum Information 10th Anniversary Edition","year":"0","author":"chuang","key":"ref1"},{"year":"0","key":"ref9"}],"event":{"name":"2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2017,6,29]]},"location":"Targoviste, Romania","end":{"date-parts":[[2017,7,1]]}},"container-title":["2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119309\/8166382\/08166458.pdf?arnumber=8166458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T17:56:21Z","timestamp":1755021381000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8166458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ecai.2017.8166458","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}