{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:46:45Z","timestamp":1750308405555,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371701","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"75-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Automatically Switched Optical Network Security Based on Quantum Key Distribution"],"prefix":"10.1145","author":[{"given":"Chen","family":"Yanyan","sequence":"first","affiliation":[{"name":"Department of Communication Engineering, School of Electronics and Electrical Engineering, Xiamen Institute of Technology, Xiamen, China"}]},{"given":"Han","family":"Wenxian","sequence":"additional","affiliation":[{"name":"Department of Information Technology and Cultural Creativity, Xiamen Technical College, Xiamen, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"optical transport networks[C]\/\/2015-17th International Conference on Transparent Optical Networks (ICTON)","volume":"2015","author":"Aleksic S.","unstructured":"Aleksic S. Towards fifth-generation (5G) optical transport networks[C]\/\/2015-17th International Conference on Transparent Optical Networks (ICTON) : IEEE , 2015 : 1 -- 4 . Aleksic S. Towards fifth-generation (5G) optical transport networks[C]\/\/2015-17th International Conference on Transparent Optical Networks (ICTON): IEEE, 2015: 1--4.","journal-title":"IEEE"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2016.2541779"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/146395.146396"},{"key":"e_1_3_2_1_4_1","volume-title":"Security of quantum key distribution with imperfect devices[C]\/\/ International Symposium on Information Theory (ISIT)Proceedings: IEEE","author":"Gottesman D","year":"2004","unstructured":"Gottesman D , Lo H K , Lutkenhaus N , Security of quantum key distribution with imperfect devices[C]\/\/ International Symposium on Information Theory (ISIT)Proceedings: IEEE , 2004 : 136. Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices[C]\/\/ International Symposium on Information Theory (ISIT)Proceedings: IEEE, 2004: 136."},{"issue":"3","key":"e_1_3_2_1_5_1","first-page":"123","article-title":"Analysis on the application and development of quantum communication[J]","volume":"32","author":"Junsen LAI","year":"2016","unstructured":"Junsen LAI , Bingbing WU , Rui TANG , Analysis on the application and development of quantum communication[J] . Telecommunications Science , 2016 , 32 ( 3 ): 123 -- 129 . Junsen LAI, Bingbing WU, Rui TANG, et al. Analysis on the application and development of quantum communication[J]. Telecommunications Science, 2016, 32(3): 123--129.","journal-title":"Telecommunications Science"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.273103"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.24297\/ijct.v9i3.3342"},{"key":"e_1_3_2_1_8_1","volume-title":"An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order[C]\/\/ Cryptographers' Track at the RSA Conference","author":"Gross H","year":"2017","unstructured":"Gross H , Mangard S , Korak T. An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order[C]\/\/ Cryptographers' Track at the RSA Conference . Springer , Cham , 2017 : 95--112. Gross H, Mangard S, Korak T. An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order[C]\/\/ Cryptographers' Track at the RSA Conference. Springer, Cham, 2017: 95--112."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53103-8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1063\/PT.3.3865"},{"volume-title":"Applications and Technology Conference (LISAT): IEEE","author":"Abushgra A","key":"e_1_3_2_1_11_1","unstructured":"Abushgra A , Elleithy K. QKD P's comparison based upon quantum cryptography rules[C]\/\/2016 IEEE Long Island Systems , Applications and Technology Conference (LISAT): IEEE , 2016: 1--5. Abushgra A, Elleithy K. QKDP's comparison based upon quantum cryptography rules[C]\/\/2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT): IEEE, 2016: 1--5."},{"key":"e_1_3_2_1_12_1","volume-title":"Experimental quantum cryptography[J]. Journal of cryptology","author":"Bennett C H","year":"1992","unstructured":"Bennett C H , Bessette F , Brassard G , Experimental quantum cryptography[J]. Journal of cryptology , 1992 , 5(1): 3--28. Bennett C H, Bessette F, Brassard G, et al. Experimental quantum cryptography[J]. Journal of cryptology, 1992, 5(1): 3--28."},{"key":"e_1_3_2_1_13_1","volume-title":"Fundamental rate-loss tradeoff for optical quantum key distribution[J]. Nature communications","author":"Takeoka M","year":"2014","unstructured":"Takeoka M , Guha S , Wilde M M . Fundamental rate-loss tradeoff for optical quantum key distribution[J]. Nature communications , 2014 : 5235. Takeoka M, Guha S, Wilde M M. Fundamental rate-loss tradeoff for optical quantum key distribution[J]. Nature communications, 2014: 5235."},{"key":"e_1_3_2_1_14_1","volume-title":"Fundamental limits of repeaterless quantum communications[J]. Nature communications","author":"Pirandola S","year":"2017","unstructured":"Pirandola S , Laurenza R , Ottaviani C , Fundamental limits of repeaterless quantum communications[J]. Nature communications , 2017 (8): 15043. Pirandola S, Laurenza R, Ottaviani C, et al. Fundamental limits of repeaterless quantum communications[J]. Nature communications, 2017(8): 15043."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4855515"},{"key":"e_1_3_2_1_16_1","volume-title":"Measurement-device-independent quantum key distribution over a 404 km optical fiber[J]. Physical review letters","author":"Yin H L","year":"2016","unstructured":"Yin H L , Chen T Y , Yu Z W , Measurement-device-independent quantum key distribution over a 404 km optical fiber[J]. Physical review letters , 2016 , 117(19): 190501. Yin H L, Chen T Y, Yu Z W, et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber[J]. Physical review letters, 2016, 117(19): 190501."},{"key":"e_1_3_2_1_17_1","volume-title":"Communication theory of secrecy systems[J]. Bell system technical journal","author":"Shannon C E","year":"1949","unstructured":"Shannon C E . Communication theory of secrecy systems[J]. Bell system technical journal , 1949 , 28(4): 656--715. Shannon C E. Communication theory of secrecy systems[J]. Bell system technical journal, 1949, 28(4): 656--715."}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371701","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:45:23Z","timestamp":1750268723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371701"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":17,"alternative-id":["10.1145\/3371676.3371701","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371701","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}