{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:09:11Z","timestamp":1729638551646,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/glocom.2016.7842191","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T15:56:26Z","timestamp":1486482986000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Quantum Geo-Encryption"],"prefix":"10.1109","author":[{"given":"Robert","family":"Malaney","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2430211"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.81.042319"},{"article-title":"Tagging Systems","year":"2006","author":"kent","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_23"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"journal-title":"The Quantum Car arXiv 1512 03521","year":"2015","author":"malaney","key":"ref14"},{"key":"ref15","first-page":"621","volume":"84","author":"weedbrook","year":"2012","journal-title":"Gaussian Quantum Information Reviews of Modern Physics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.187902"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.60.157"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.12693\/APhysPolA.101.357"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814469"},{"key":"ref4","article-title":"A Novel Approach for Data Encryption Depending on User Location","author":"liao","year":"2006","journal-title":"Pacific Asia Conference on Information Systems (PACIS)"},{"key":"ref27","first-page":"624","article-title":"on Time-of-Arrival Estimation with Statistical Channel Knowledge at the Receiver","author":"dardari","year":"2009","journal-title":"IEEE International Conference on Ultra-Wideband"},{"key":"ref3","first-page":"288","article-title":"Location Based Encryption and its Role in Digital Cinema Distribution","author":"scott","year":"2003","journal-title":"Proc IONGPS"},{"journal-title":"Self-Encryption Scheme for Data Security in Mobile Devices CCNC'09","year":"2009","author":"chen","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.05247"},{"key":"ref5","article-title":"Geoencryption Using Loran","author":"qiu","year":"2007","journal-title":"Proceeding of International Loran Association NTM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2011.6168482"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5120\/1109-1452"},{"key":"ref2","first-page":"734","article-title":"A Location Based Encryption Technique and some of its Applications","author":"scott","year":"2003","journal-title":"Proceedings of the 2003 National Technical Meeting of the Institute of Navigation"},{"key":"ref9","first-page":"4917","article-title":"A Navel Approach to Identify Geo-Encryption with GPS and Different Parameters","volume":"3","author":"rajeswari","year":"2012","journal-title":"International J Comp Inform Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/srep16080"},{"journal-title":"Quantum Memories Emerging Applications and Recent Advances arXiv 1511 04018","year":"2015","author":"heshamia","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/nature14025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2005.856194"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/ARRAY.2010.5613314","article-title":"Real-time Through-wall Imaging Using an Ultrawideband MIMO Phased Array Radar System","volume":"12 15","author":"ralston","year":"2010","journal-title":"Proceedings of IEEE International Symposium on Phased Array Systems and Technology"},{"key":"ref26","first-page":"10158","author":"van","year":"1968","journal-title":"Trees Detection Estimation and Modulation Theory"},{"key":"ref25","first-page":"533","article-title":"On the TOA Estimation for UWB Ranging in Complex Confined Area, in Signals, Systems and Electronics","volume":"30","author":"chehri","year":"2007","journal-title":"2007 ISSSE &#x2018;07 International Symposium on"}],"event":{"name":"GLOBECOM 2016 - 2016 IEEE Global Communications Conference","start":{"date-parts":[[2016,12,4]]},"location":"Washington, DC, USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840067\/7841475\/07842191.pdf?arnumber=7842191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T07:12:58Z","timestamp":1568790778000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7842191\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/glocom.2016.7842191","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}