{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:11:51Z","timestamp":1729617111867,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/icct46805.2019.8947177","type":"proceedings-article","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T19:42:22Z","timestamp":1577994142000},"page":"283-289","source":"Crossref","is-referenced-by-count":3,"title":["Modeling and Security Analysis Method of Quantum Key Distribution Protocol Based on Colored Petri Nets"],"prefix":"10.1109","author":[{"given":"Xiaoming","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jian","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Yunmei","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.062301"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.032316"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0219749908003256"},{"key":"ref13","article-title":"Kommunication mit automaten[D]","author":"petri","year":"1962","journal-title":"Bonn Institutefur In strumentlle Mathematik"},{"key":"ref14","first-page":"95","article-title":"Quantum key distribution secure threshold based on BB84 protocol [J]","volume":"60","author":"zhao","year":"2011","journal-title":"Acta Phys Sin"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.09.018"},{"key":"ref16","first-page":"543","article-title":"Quantum Direct Communication with Authentication[J]","volume":"73","author":"lee","year":"2005","journal-title":"Physical Review A"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"5796","DOI":"10.7498\/aps.56.5796","article-title":"Deterministic quantum key distribution based on random phase coding [J]","volume":"56","author":"liu","year":"2007","journal-title":"Acta Phys Sin"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.08.105"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2016.2570000"},{"key":"ref4","article-title":"Quantum Oblivious Transfer is Secure Against all Individual Measurements. [C]","author":"mayers","year":"1994","journal-title":"Workshop on Physics and Computation"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1126\/science.283.5410.2050"},{"key":"ref8","first-page":"882","article-title":"Security of quantum key distribution with entangled photons against individual attacks[J]","volume":"65","author":"waks","year":"2000","journal-title":"Physical Review A"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807289"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.3121"},{"key":"ref1","article-title":"Quantum cryptography: Public key distribution and coin tossing [C]","author":"bennett","year":"1984","journal-title":"Proceedings of the IEEE International Conference on Computers Systems and Signal Processing"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"325","DOI":"10.26421\/QIC4.5-1","article-title":"Security of quantum key distribution with imperfect Devices[J]","volume":"4","author":"gottesman","year":"2004","journal-title":"Quantum Information and Computation"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.03.009"},{"key":"ref22","article-title":"Security Amplification of the Computer-Aided Voting System Using Quantum Cryptography Protocols [C]","author":"limar","year":"2017","journal-title":"IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications"},{"key":"ref21","article-title":"IPsec Multicast Architecture Based on Quantum Key Distribution","author":"farouk","year":"2018","journal-title":"Quantum Secret Sharing and Measurement [J]"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2017.357"},{"key":"ref23","first-page":"398","article-title":"Enhancing data and privacy security in mobile cloud computing through quantum cryptography [C]","author":"han","year":"2017","journal-title":"IEEE International Conference on Software Engineering and Service Sciences"}],"event":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2019,10,16]]},"location":"Xi'an, China","end":{"date-parts":[[2019,10,19]]}},"container-title":["2019 IEEE 19th International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8943077\/8946993\/08947177.pdf?arnumber=8947177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T12:38:04Z","timestamp":1695559084000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8947177\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icct46805.2019.8947177","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}