{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:42Z","timestamp":1750307142601,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T00:00:00Z","timestamp":1319068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,20]]},"DOI":"10.1145\/2047594.2047662","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"263-268","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A solace in quantum"],"prefix":"10.1145","author":[{"given":"Michael A.","family":"Costa","sequence":"first","affiliation":[{"name":"Fanshawe College, London, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,10,20]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Benenti G. G. Casati et al. 2005. Principles of Quantum Computation and Information: Volume 1 Basic Concepts. World Scientific New Jersey.  Benenti G. G. Casati et al. 2005. Principles of Quantum Computation and Information: Volume 1 Basic Concepts. World Scientific New Jersey.","key":"e_1_3_2_1_1_1","DOI":"10.1142\/5528"},{"doi-asserted-by":"crossref","unstructured":"Benenti G. G. Casati et al. 2005. Principles of Quantum Computation and Information: Volume 2 Basic Tools and Special Topics. World Scientific New Jersey.   Benenti G. G. Casati et al. 2005. Principles of Quantum Computation and Information: Volume 2 Basic Tools and Special Topics. World Scientific New Jersey.","key":"e_1_3_2_1_2_1","DOI":"10.1142\/5528"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing. (IEEE","author":"Bennett C. H.","year":"1984","unstructured":"Bennett , C. H. 1984 . Quantum Cryptography: Public Key Distribution and Coin Tossing . In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing. (IEEE , Bangalore India , Dec. 1984), 175--179. Bennett, C. H. 1984. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing. (IEEE, Bangalore India, Dec. 1984), 175--179."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1103\/PhysRevLett.68.3121"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1103\/PhysRevLett.68.557"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1134\/S0030400X07080061"},{"doi-asserted-by":"crossref","unstructured":"Dusek M. N. Lutkenhaus et al. 2006. Quantum Cryptography. Progress in Optics. 49 (May 2006) 381--454. DOI= http:\/\/dx.doi.org\/10.1016\/S0079--6638(06)49005--3 10.1016\/S0079--6638(06)49005--3","key":"#cr-split#-e_1_3_2_1_7_1.1","DOI":"10.1016\/S0079-6638(06)49005-3"},{"doi-asserted-by":"crossref","unstructured":"Dusek M. N. Lutkenhaus et al. 2006. Quantum Cryptography. Progress in Optics. 49 (May 2006) 381--454. DOI= http:\/\/dx.doi.org\/10.1016\/S0079--6638(06)49005--3","key":"#cr-split#-e_1_3_2_1_7_1.2","DOI":"10.1016\/S0079-6638(06)49005-3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1103\/PhysRevLett.67.661"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1038\/nphys569"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1364\/OE.15.007853"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1103\/PhysRevLett.102.057403"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1063\/1.118224"},{"volume-title":"Security In Computing","author":"Pfleeger C. P.","unstructured":"Pfleeger , C. P. and S. L. Pfleeger 2007. Security In Computing . Prentice Hall , Upper Saddle River, NJ. Pfleeger, C. P. and S. L. Pfleeger 2007. Security In Computing. Prentice Hall, Upper Saddle River, NJ.","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1142\/S0219749908003529"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1063\/1.2158700"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1103\/PhysRevLett.97.247401"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1103\/PhysRevLett.98.010504"},{"key":"e_1_3_2_1_18_1","volume-title":"an Industry Specification Group (ISG)\" Retrieved","author":"Secure Communication","year":"2011","unstructured":"SECOQC. \"FP6-project Secure Communication based on Quantum Cryptography : an Industry Specification Group (ISG)\" Retrieved July 10, 2011 from, http:\/\/www.etsi.org\/WebSite\/Technologies\/QKD.aspx SECOQC. \"FP6-project Secure Communication based on Quantum Cryptography: an Industry Specification Group (ISG)\" Retrieved July 10, 2011 from, http:\/\/www.etsi.org\/WebSite\/Technologies\/QKD.aspx"},{"key":"e_1_3_2_1_19_1","volume-title":"July 10, 2011 from, http:\/\/www.secoqc.net\/html\/conference","author":"SECOQC.","year":"2008","unstructured":"SECOQC. 2008 . \" International Conference.\" Retrieved , July 10, 2011 from, http:\/\/www.secoqc.net\/html\/conference SECOQC. 2008. \"International Conference.\" Retrieved, July 10, 2011 from, http:\/\/www.secoqc.net\/html\/conference"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1038\/nature06124"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1063\/1.2126792"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1103\/PhysRevLett.97.083002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1088\/1367-2630\/9\/12\/434"}],"event":{"sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"acronym":"SIGITE' 11","name":"SIGITE' 11: ACM Special Interest Group for Information Technology Education Conference","location":"West Point New York USA"},"container-title":["Proceedings of the 2011 conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047594.2047662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:55Z","timestamp":1750240135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,20]]},"references-count":24,"alternative-id":["10.1145\/2047594.2047662","10.1145\/2047594"],"URL":"https:\/\/doi.org\/10.1145\/2047594.2047662","relation":{},"subject":[],"published":{"date-parts":[[2011,10,20]]},"assertion":[{"value":"2011-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}