{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:26:42Z","timestamp":1729621602278,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/icsai.2014.7009364","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:37:49Z","timestamp":1421721469000},"page":"639-643","source":"Crossref","is-referenced-by-count":1,"title":["Symmetric controlled quantum secret sharing scheme via stabilizer codes"],"prefix":"10.1109","author":[{"given":"Li","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Xiaoqi","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Shunru","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"jozsa","key":"19"},{"journal-title":"Quantum Computation and Quantum Information","year":"2000","author":"nielsen","key":"17"},{"key":"18","first-page":"164","volume":"404","author":"pati","year":"0","journal-title":"Nature"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.63.042301"},{"key":"16","doi-asserted-by":"crossref","first-page":"77902","DOI":"10.1103\/PhysRevLett.92.077902","volume":"92","author":"wang","year":"2004","journal-title":"Phys Rev Lett"},{"key":"13","doi-asserted-by":"crossref","first-page":"22303","DOI":"10.1103\/PhysRevA.72.022303","volume":"72","author":"zhang","year":"2005","journal-title":"Phys Rev A"},{"key":"14","doi-asserted-by":"crossref","first-page":"12328","DOI":"10.1103\/PhysRevA.71.012328","volume":"71","author":"singh","year":"2005","journal-title":"Phys Rev A"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"hillery","year":"1999","journal-title":"Phys Rev A"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012304"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"gisin","year":"2002","journal-title":"Rev Mod Phys"},{"key":"3","doi-asserted-by":"crossref","first-page":"22338","DOI":"10.1103\/PhysRevA.72.022338","volume":"72","author":"deng","year":"2005","journal-title":"Phys Rev A"},{"key":"20","doi-asserted-by":"crossref","first-page":"32324","DOI":"10.1103\/PhysRevA.65.032324","volume":"65","author":"shimizu","year":"2002","journal-title":"Phys Rev A"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1016\/j.physleta.2003.08.007","volume":"316","author":"yan","year":"2003","journal-title":"Phys Lett A"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.58.4394","volume":"58","author":"karlsson","year":"1998","journal-title":"Phys Rev A"},{"key":"10","doi-asserted-by":"crossref","first-page":"34301","DOI":"10.1103\/PhysRevA.69.034301","volume":"69","author":"song","year":"2004","journal-title":"Phys Rev A"},{"journal-title":"Information Theoretic Security","year":"2014","author":"damgard","key":"7"},{"key":"6","doi-asserted-by":"crossref","first-page":"22308","DOI":"10.1103\/PhysRevA.67.022308","volume":"67","author":"namiki","year":"2003","journal-title":"Phys Rev A"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"lo","year":"1999","journal-title":"Science"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.67.044302"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"ekert","year":"1991","journal-title":"Phys Rev Lett"},{"key":"8","volume":"68","author":"bennett","year":"1992","journal-title":"Phys Rev Lett"}],"event":{"name":"2014 2nd International Conference on Systems and Informatics (ICSAI)","start":{"date-parts":[[2014,11,15]]},"location":"Shanghai, China","end":{"date-parts":[[2014,11,17]]}},"container-title":["The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994954\/7009247\/07009364.pdf?arnumber=7009364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:54:36Z","timestamp":1498190076000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7009364\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icsai.2014.7009364","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}