{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:26:55Z","timestamp":1750746415601,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/glocom.2005.1577930","type":"proceedings-article","created":{"date-parts":[[2006,1,25]],"date-time":"2006-01-25T16:24:16Z","timestamp":1138206256000},"page":"5 pp.","source":"Crossref","is-referenced-by-count":13,"title":["On quantum authentication protocols"],"prefix":"10.1109","author":[{"given":"Y.","family":"Kanamori","sequence":"first","affiliation":[]},{"family":"Seong-Moo Yoo","sequence":"additional","affiliation":[]},{"given":"D.A.","family":"Gregory","sequence":"additional","affiliation":[]},{"given":"F.T.","family":"Sheldon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/0471213748"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191318"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.64.062309"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.022303"},{"year":"0","key":"13"},{"article-title":"Quantum secure identification using entanglement and catalysis","year":"0","author":"barnum","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1088\/0253-6102\/56\/2\/13"},{"article-title":"Quantum authentication and key distribution using catalysis","year":"0","author":"jensen","key":"12"},{"journal-title":"Quantum Computation and Quantum Information","year":"2000","author":"nielsen","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"article-title":"Quantum authentication using entangled state","year":"0","author":"zhang","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181969"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1063\/1.1738173"},{"key":"5","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proc IEEE Int Conf on Computers Systems and Signal Processing"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04209-0"},{"article-title":"A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography","year":"0","author":"kuhn","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","article-title":"Quantum identification system","volume":"60","author":"dusekl","year":"1999","journal-title":"Phys Rev A"}],"event":{"name":"GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.","start":{"date-parts":[[2005,12,2]]},"location":"St. Louis, MO, USA","end":{"date-parts":[[2005,12,2]]}},"container-title":["GLOBECOM '05. IEEE Global Telecommunications Conference, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10511\/33287\/01577930.pdf?arnumber=1577930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T02:45:14Z","timestamp":1497667514000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1577930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/glocom.2005.1577930","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}