{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:35Z","timestamp":1750220195134,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3558819.3565196","type":"proceedings-article","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T01:37:33Z","timestamp":1666834653000},"page":"803-809","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Introduction and Discussion on Quantum Communication and Quantum Network"],"prefix":"10.1145","author":[{"given":"Shengyi","family":"Dai","sequence":"first","affiliation":[{"name":"University of Toronto, Canada"}]},{"given":"Yuhao","family":"Fu","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, United States of America"}]},{"given":"Mujin","family":"Guo","sequence":"additional","affiliation":[{"name":"University College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-08-012102-4.50013"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/andp.19053220607"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-08-012103-1.50014-1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-61659-4_26"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrev.28.1049"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.70.1895"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/37539"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature02643"},{"key":"e_1_3_2_1_9_1","first-page":"175","volume-title":"Proceedings of IEEE International Conference on Computers Systems and Signal Processing Bangalore India","author":"Bennett C. H.","year":"1984","unstructured":"C. H. Bennett and G. Brassard , \" Quantum cryptography: Public key distribution and coin tossing \", Proceedings of IEEE International Conference on Computers Systems and Signal Processing Bangalore India , pp. 175 - 179 , 1984 . C. H. Bennett and G. Brassard, \"Quantum cryptography: Public key distribution and coin tossing\", Proceedings of IEEE International Conference on Computers Systems and Signal Processing Bangalore India, pp. 175-179, 1984."},{"issue":"351","key":"e_1_3_2_1_10_1","article-title":"Unconditional security in quantum cryptography","volume":"48","author":"Mayers D.","year":"2001","unstructured":"D. Mayers , \" Unconditional security in quantum cryptography \", J. Assoc. Compo Mach. , vol. 48 , no. 351 , 2001 . D. Mayers, \"Unconditional security in quantum cryptography\", J. Assoc. Compo Mach., vol. 48, no. 351, 2001.","journal-title":"J. Assoc. Compo Mach."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.26421\/qic4.5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.126.010503"},{"key":"e_1_3_2_1_13_1","first-page":"01","volume":"91","author":"Bose S.","year":"2079","unstructured":"S. Bose , Phys. Rev. Lett. 91 , 2079 01 2003. S. Bose, Phys. Rev. Lett. 91, 207901 2003.","journal-title":"Phys. Rev. Lett."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052315"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.74.012321"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1088\/1464-4266\/7\/10\/023"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aan6972"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/74074.74087"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586"},{"key":"e_1_3_2_1_20_1","volume-title":"Quantum Communications in Future Networks and Services. Quantum Reports","author":"Manzalini Antonio","year":"2020","unstructured":"Antonio Manzalini . 11 March, 2020. Quantum Communications in Future Networks and Services. Quantum Reports 2020 . Antonio Manzalini. 11 March, 2020. Quantum Communications in Future Networks and Services. Quantum Reports 2020."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Nicolas Gisin Rob Thew. 1 February 2008. Quantum communication.  Nicolas Gisin Rob Thew. 1 February 2008. Quantum communication.","DOI":"10.1038\/nphoton.2007.22"},{"key":"e_1_3_2_1_22_1","unstructured":"M. Pompili 8 February 2021. Realization of a multi-node quantum network of remote solid-state qubits.  M. Pompili 8 February 2021. Realization of a multi-node quantum network of remote solid-state qubits."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1360\/972012-224"},{"issue":"04","key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.7498\/aps.64.040301","article-title":"Model of Quantum Tunnel Based on Entanglement State Quantum Communication Network","volume":"64","author":"Chen Peng","year":"2015","unstructured":"Peng Chen , \" Model of Quantum Tunnel Based on Entanglement State Quantum Communication Network .\" Acta Physica Sinica 64 . 04 ( 2015 ): 5 - 11 . doi: CNKI: SUN: WLXB.0.2015 - 04 - 002. Peng Chen, \"Model of Quantum Tunnel Based on Entanglement State Quantum Communication Network.\" Acta Physica Sinica 64.04 (2015): 5 - 11. doi: CNKI: SUN: WLXB.0.2015 - 04 - 002.","journal-title":"Acta Physica Sinica"}],"event":{"name":"ICCSIE2022: 7th International Conference on Cyber Security and Information Engineering","acronym":"ICCSIE2022","location":"Brisbane QLD Australia"},"container-title":["Proceedings of the 7th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565196","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558819.3565196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:37Z","timestamp":1750186957000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":24,"alternative-id":["10.1145\/3558819.3565196","10.1145\/3558819"],"URL":"https:\/\/doi.org\/10.1145\/3558819.3565196","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}