{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:43:58Z","timestamp":1770846238716,"version":"3.50.1"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100006041","name":"Innovate UK","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006041","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11342840","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"4157-4162","source":"Crossref","is-referenced-by-count":0,"title":["Formalisation and Analysis of Decoy QKD in the Isabelle Infrastructure and Insider framework using Refinement and Attack Trees"],"prefix":"10.1109","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[{"name":"Middlesex University,Faculty of Science and Technology,Department of Computer Science,London,UK"}]},{"given":"Rajagopal","family":"Nagarajan","sequence":"additional","affiliation":[{"name":"Institute of Physics,Quentangle Quantum Systems Ltd.,London,UK,N1 9BU"}]},{"given":"Michael C.","family":"Parker","sequence":"additional","affiliation":[{"name":"University of Essex,School of Computer Science and Electronic Engineering,Colchester,UK"}]},{"given":"Catherine","family":"White","sequence":"additional","affiliation":[{"name":"British Telecom Resarch,BT Group Plc,UK"}]}],"member":"263","reference":[{"key":"ref1","first-page":"175","article-title":"Quantum cryptography: Public-key distribution and coin tossing","volume-title":"Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing","author":"Bennett"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-024-00873-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.057901"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/e25111556"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3367\/UFNe.2020.11.038882"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101572"},{"key":"ref7","volume-title":"A Formal Development Cycle for Security Engineering in Isabelle","author":"Kamm\u00fcller","year":"2020"},{"key":"ref8","volume-title":"An Automated Analysis of the Security of Quantum Key Distribution","author":"Nagarajan","year":"2005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1998-61-205"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11342840.pdf?arnumber=11342840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:52:56Z","timestamp":1770843176000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11342840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11342840","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}