{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:43:24Z","timestamp":1764837804789,"version":"3.46.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,3]]},"DOI":"10.1109\/icumt67815.2025.11268623","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:02Z","timestamp":1764787202000},"page":"46-51","source":"Crossref","is-referenced-by-count":0,"title":["QuLoRa: A Classical-Quantum Hybrid Solution for Securing Long Range Communication"],"prefix":"10.1109","author":[{"given":"Rohit","family":"Pawar","sequence":"first","affiliation":[{"name":"UVCE,Dept. of ECE,Bangalore,India"}]},{"given":"Saher","family":"Ali","sequence":"additional","affiliation":[{"name":"UVCE,Dept. of ECE,Bangalore,India"}]},{"given":"Pushpa","family":"R","sequence":"additional","affiliation":[{"name":"UVCE,Dept. of ECE,Bangalore,India"}]},{"given":"Shloka","family":"Rai","sequence":"additional","affiliation":[{"name":"UVCE,Dept. of ECE,Bangalore,India"}]},{"given":"Kiran","family":"K","sequence":"additional","affiliation":[{"name":"UVCE,Dept. of ECE,Bangalore,India"}]}],"member":"263","reference":[{"key":"ref1","article-title":"History of Wireless Communication","author":"Winters","year":"2004","journal-title":"ResearchGate"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/fi11100216"},{"volume-title":"LoRaWAN 1.1 Specification","year":"2017","key":"ref3"},{"key":"ref4","article-title":"A systematic review of security in the LoRaWAN network protocol","author":"De Moraes","year":"2021","journal-title":"arXiv preprint, arXiv:2105.00384"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2020.3024956"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1173-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/isemantic63362.2024.10761981"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tqcebt59414.2024.10545237"},{"issue":"15","key":"ref9","first-page":"9875","article-title":"A quantum-inspired secure LSB image steganography technique using chaotic substitution","volume":"79","author":"Hussain","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1038\/s42254-023-00603-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/qut.2023.4"},{"issue":"7670","key":"ref12","first-page":"43","article-title":"Satellite-based entanglement distribution over 1200 kilometres","volume":"549","author":"Yin","year":"2017","journal-title":"Nature"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.37943\/qrkj7456"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/photonics11040367"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.47.460"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES\u2014The Advanced Encryption Standard","author":"Daemen","year":"2002"},{"volume-title":"Advanced Encryption Standard (AES)","year":"2001","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-015-0176-z"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/icissec.2015.7371010"},{"key":"ref23","first-page":"63043","article-title":"Quantum Key Distribution Highly Sensitive to Eavesdropping","volume":"11","author":"Brierley","year":"2009","journal-title":"New J. Phys"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.012309"},{"key":"ref25","first-page":"1","article-title":"Limitations on practical quantum cryptography","volume-title":"Proc. Int. Conf. Quantum Information","author":"Brassard"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.74.145"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.22331\/q-2018-08-06-79"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-conmatphys-031119-050605"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.190502"}],"event":{"name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2025,11,3]]},"location":"Florence, Italy","end":{"date-parts":[[2025,11,5]]}},"container-title":["2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268479\/11268547\/11268623.pdf?arnumber=11268623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:40:28Z","timestamp":1764837628000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icumt67815.2025.11268623","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]}}}