{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:24:37Z","timestamp":1725564277451},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/isit.2005.1523492","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T11:51:59Z","timestamp":1160567519000},"page":"1013-1017","source":"Crossref","is-referenced-by-count":1,"title":["Noise tolerance of the BB84 protocol with random privacy amplification"],"prefix":"10.1109","author":[{"given":"S.","family":"Watanabe","sequence":"first","affiliation":[]},{"given":"R.","family":"Matsumoto","sequence":"additional","affiliation":[]},{"given":"R.","family":"Uyematsu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.077902"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.66.060302"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.54.2614"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.052305"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1063\/1.1497999"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/37\/34\/009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/382780.382781"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.71.052328"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807289"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"ref1","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proceedings of IEEE International Conference on Computers Systems and Signal Processing"},{"key":"ref9","article-title":"Information theory: Coding theorems for discrete memoryless systems","author":"csiszar","year":"1981","journal-title":"Akademiai Kiado"}],"event":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","start":{"date-parts":[[2005,9,4]]},"location":"Adelaide, Australia","end":{"date-parts":[[2005,9,9]]}},"container-title":["Proceedings. International Symposium on Information Theory, 2005. ISIT 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10215\/32581\/01523492.pdf?arnumber=1523492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T22:16:16Z","timestamp":1489529776000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isit.2005.1523492","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}