{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:01:59Z","timestamp":1729666919295,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/rivf.2009.5174626","type":"proceedings-article","created":{"date-parts":[[2009,7,29]],"date-time":"2009-07-29T15:33:46Z","timestamp":1248881626000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["BB84 Implementation and Computer Reality"],"prefix":"10.1109","author":[{"given":"Patrick","family":"Bellot","sequence":"first","affiliation":[]},{"given":"Minh-Dung","family":"Dang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-48910-X_3","article-title":"software performance of universal hash functions","author":"nevelsteen","year":"1999","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"year":"0","key":"17"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191318"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/800105.803400"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_35"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1117\/12.541698"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF.2007.369151"},{"key":"20","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-48405-1_14","article-title":"umac: fast and secure message authentication","author":"black","year":"1999","journal-title":"Proceedings of Advances in Cryptology CRYPTO'99"},{"journal-title":"The HQNET Project","year":"0","key":"22"},{"journal-title":"The VISQ Project","year":"0","key":"23"},{"journal-title":"The VLC Media Player Software","year":"0","key":"24"},{"key":"25","doi-asserted-by":"crossref","first-page":"5230","DOI":"10.1103\/PhysRevA.67.052303","article-title":"fast, efficient error reconciliation for quantum cryptography","volume":"67","author":"buttler","year":"2003","journal-title":"Phys Rev A"},{"journal-title":"SECOQC White Paper on Quantum Key Distribution and Cryptography","year":"2007","author":"alleaume","key":"3"},{"journal-title":"Current Status of the DARPA Quantum Network","year":"0","author":"elliott","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/5\/1\/336"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359579"},{"key":"7","first-page":"6","volume":"1","author":"shannon","year":"1957","journal-title":"Certain Results in Coding Theory for Noisy Channels"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/09500340108240897"}],"event":{"name":"2009 IEEE-RIVF International Conference on Computing and Communication Technologies","start":{"date-parts":[[2009,7,13]]},"location":"Danang City, Viet Nam","end":{"date-parts":[[2009,7,17]]}},"container-title":["2009 IEEE-RIVF International Conference on Computing and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5174598\/5174599\/05174626.pdf?arnumber=5174626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T19:24:39Z","timestamp":1558466679000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5174626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/rivf.2009.5174626","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}