{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:56:03Z","timestamp":1725418563717},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/isit.2010.5513653","type":"proceedings-article","created":{"date-parts":[[2010,8,19]],"date-time":"2010-08-19T15:57:25Z","timestamp":1282233445000},"page":"2677-2681","source":"Crossref","is-referenced-by-count":2,"title":["Secure key rate of the BB84 protocol using finite sample bits"],"prefix":"10.1109","author":[{"given":"Yousuke","family":"Sano","sequence":"first","affiliation":[]},{"given":"Ryutaroh","family":"Matsumoto","sequence":"additional","affiliation":[]},{"given":"Tomohiko","family":"Uyematsu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1017\/S0269964800142032"},{"article-title":"Theoretical study of continuous-variable quantum key distribution","year":"2009","author":"leverrier","key":"ref11"},{"article-title":"The Theory of Error-Correcting Codes","year":"1977","author":"macwilliams","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/2684691"},{"article-title":"Quantum Computation and Quantum Information.","year":"2000","author":"nielsen","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2307\/2684633"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012332"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513653"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89304-2_8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/4\/045024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729330"},{"article-title":"Statistical Inference","year":"2001","author":"casella","key":"ref5"},{"article-title":"Elements of Information Theory","year":"2006","author":"cover","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(75)90075-0"},{"key":"ref2","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proc IEEE Intl Conf on Computers Systems and Signal Processing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_21"},{"article-title":"Updating quantum cryptography report ver. 1","year":"2009","author":"dodson","key":"ref9"},{"article-title":"A study of channel estimation and postprocessing in quantum key distribution protocols","year":"2009","author":"watanabe","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.78.042316"}],"event":{"name":"2010 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2010,6,13]]},"location":"Austin, TX, USA","end":{"date-parts":[[2010,6,18]]}},"container-title":["2010 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5508195\/5513230\/05513653.pdf?arnumber=5513653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T15:07:57Z","timestamp":1489849677000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isit.2010.5513653","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}