{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:26:12Z","timestamp":1761675972327,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/icufn.2012.6261711","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T20:03:37Z","timestamp":1345147417000},"page":"280-285","source":"Crossref","is-referenced-by-count":10,"title":["Secure and efficient key management technique in quantum cryptography network"],"prefix":"10.1109","author":[{"given":"Montida","family":"Pattaranantakul","sequence":"first","affiliation":[]},{"given":"Aroon","family":"Janthong","sequence":"additional","affiliation":[]},{"given":"Kittichai","family":"Sanguannam","sequence":"additional","affiliation":[]},{"given":"Paramin","family":"Sangwongngam","sequence":"additional","affiliation":[]},{"given":"Keattisak","family":"Sripimanwat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2005","author":"stallings","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"journal-title":"Open Systems Interconnection Reference Model - Part 2 Security Architecture","year":"1988","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/7\/075001"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/4\/1\/346"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2010.538"},{"key":"9","article-title":"Principles of Key Management","volume":"11","author":"landrock","year":"1993","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1364\/OE.19.010387"},{"key":"11","first-page":"22","article-title":"Key Management Interoperability Protocol (KMIP): Addressing the Need for Standardization in Enterprise Key Management","year":"2009","journal-title":"White Papers"}],"event":{"name":"2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN)","start":{"date-parts":[[2012,7,4]]},"location":"Puket, Thailand","end":{"date-parts":[[2012,7,6]]}},"container-title":["2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6252853\/6261644\/06261711.pdf?arnumber=6261711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:39:51Z","timestamp":1490128791000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6261711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icufn.2012.6261711","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}