{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:05:41Z","timestamp":1730221541317,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/ewdts.2019.8884459","type":"proceedings-article","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T11:34:05Z","timestamp":1572953645000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Length Limiting of Quantum Key Distribution at Two-Stage Synchronization"],"prefix":"10.1109","author":[{"given":"K.E.","family":"Rumyantsev","sequence":"first","affiliation":[]},{"given":"H. H. Sh.","family":"Shakir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"32","author":"rumyantsev","year":"2017","journal-title":"Synchronization in the system of quantum key distribution with automatic compensation of polarization distortions \/\/ Telecommunications"},{"key":"ref11","first-page":"36","author":"rumyantsev","year":"2017","journal-title":"Protection of the synchronization process in the system of quantum key distribution with automatic compensation of polarization distortion \/\/ Telecommunications"},{"key":"ref12","first-page":"125","author":"rumyantsev","year":"2015","journal-title":"Synchronization of the quantum key distribution system in the single-photon registration mode of pulses to increase security \/\/ Radio and communications technology"},{"key":"ref13","first-page":"6","volume":"169","author":"rumyantsev","year":"2015","journal-title":"Improving the efficiency of the algorithm for entering into synchronism of the system of quantum key distribution Izvestiya SFedU Engineering sciences"},{"journal-title":"Synchronization algorithm of quantum key distribution system with protection from unauthorized access \/\/ Proceeding of the IEEE Photonics Society Workshop on Recent Advances in Photonics (IEEE WRAP 2015)","year":"2015","author":"pljonkin","key":"ref14"},{"key":"ref15","first-page":"531","author":"pljonkin","year":"2016","journal-title":"Single-photon Synchronization Mode of Quantum Key Distribution System \/\/ Proceeding of the International Conference on Computational Techniques in Information and Communication Technology 2016 (ICCTICT 2016)"},{"journal-title":"ID100 v 20160128 Specifications","year":"2016","key":"ref16"},{"journal-title":"ID230 v2015 04 29 Specifications as of","year":"2015","key":"ref17"},{"journal-title":"ID280","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3136825.3136888"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ELINFOCOM.2016.7562955"},{"key":"ref3","first-page":"441","volume":"85","author":"shor","year":"2000","journal-title":"Simple proof of security of the BB84 quantum key distribution protocole \/\/ Physical Review Letters"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms1348"},{"key":"ref5","first-page":"54","volume":"5","author":"kurochkin","year":"2012","journal-title":"and other Experimental studies in the field of quantum cryptography \/\/ Photonics"},{"key":"ref8","volume":"11","author":"makarov","year":"2009","journal-title":"Controlling passively quenched single photon detectors by bright light \/\/ New Journal of Physics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2010.214"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"ref1","first-page":"175","article-title":"Institute of Electrical and Electronics Engineers","author":"bennett","year":"1984","journal-title":"Quantum cryptography Public key distribution and coin tossing \/\/ Proceedings of IEEE international conference on computers systems and signal processing"},{"key":"ref9","volume":"73","author":"gisin","year":"2006","journal-title":"Trojan-horse attacks on quantum-key-distribution systems \/\/ Physical Review A"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIp.2017.68"},{"key":"ref21","first-page":"75","article-title":"Two-stage time synchronization algorithm in the system of quantum key distribution with automatic polarization distortion compensation \/\/ Izvestiya SFU","author":"rumyantsev","year":"2017","journal-title":"Technical Science"}],"event":{"name":"2019 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2019,9,13]]},"location":"Batumi, Georgia","end":{"date-parts":[[2019,9,16]]}},"container-title":["2019 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871308\/8884369\/08884459.pdf?arnumber=8884459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:25:22Z","timestamp":1658157922000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ewdts.2019.8884459","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}