{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:07Z","timestamp":1740141787072,"version":"3.37.3"},"reference-count":19,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2016A010101017"],"award-info":[{"award-number":["2016A010101017"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2016A030313023"],"award-info":[{"award-number":["2016A030313023"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 61771222"],"award-info":[{"award-number":["No. 61771222"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science and Technology Project of Guangzhou","award":["201707010253"],"award-info":[{"award-number":["201707010253"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,5]]},"abstract":"<jats:p> Currently, wearable devices are developing prosperously in the fields of global communication electronic products and personal intelligent terminals, but their information security problem cannot be ignored. Based on quantum security communication principle and combined with the special requirements of wearable devices for information security technology, this article gives a safe transmission scheme used for protecting the sensitive information of wearable devices. This scheme is to realize the safe transmission of sensitive information about wearable devices through quantum key distribution, quantum teleportation, and other quantum information security technologies and this scheme has an unconditional security than the traditional encryption methods based on algorithmic complexity. <\/jats:p>","DOI":"10.1177\/1550147718779678","type":"journal-article","created":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T05:31:21Z","timestamp":1527658281000},"page":"155014771877967","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Quantum solution for secure information transmission of wearable devices"],"prefix":"10.1177","volume":"14","author":[{"given":"Xiaojun","family":"Wen","sequence":"first","affiliation":[{"name":"Shenzhen Polytechnic, Shenzhen, China"}]},{"given":"Genping","family":"Wang","sequence":"additional","affiliation":[{"name":"Shenzhen Polytechnic, Shenzhen, China"}]},{"given":"Yongzhi","family":"Chen","sequence":"additional","affiliation":[{"name":"Shijiazhuang University, Shijiazhuang, China"}]},{"given":"Zhengzhong","family":"Yi","sequence":"additional","affiliation":[{"name":"Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China"}]},{"given":"Zoe L","family":"Jiang","sequence":"additional","affiliation":[{"name":"Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen, China"}]},{"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]}],"member":"179","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"bibr1-1550147718779678","first-page":"10","volume":"11","author":"Liu J.","year":"2014","journal-title":"Inf Security Technol"},{"key":"bibr2-1550147718779678","first-page":"69","volume":"3","author":"Gao Y.","year":"2015","journal-title":"Secrecy Sci Technol"},{"key":"bibr3-1550147718779678","first-page":"50","volume":"21","author":"Zhang J.","year":"2014","journal-title":"Comput Netw"},{"key":"bibr4-1550147718779678","first-page":"79","volume":"9","author":"Qiu Y.","year":"2016","journal-title":"Netinfo Security"},{"issue":"11","key":"bibr5-1550147718779678","volume":"38","author":"Li T","year":"2016","journal-title":"Comput Eng Sci"},{"key":"bibr6-1550147718779678","unstructured":"Wen X, Chen Y. Quantum signature and its application. Beijing, China: Aviation Industry Press, 2012, pp.1\u201363 (in Chinese)."},{"key":"bibr7-1550147718779678","doi-asserted-by":"publisher","DOI":"10.1142\/S0219749916500258"},{"issue":"4","key":"bibr8-1550147718779678","first-page":"466","volume":"32","author":"Fan X","year":"2015","journal-title":"Chin J Quantum Electron"},{"issue":"4","key":"bibr9-1550147718779678","first-page":"334","volume":"21","author":"Dong Y","year":"2015","journal-title":"J Quantum Optics"},{"issue":"5","key":"bibr10-1550147718779678","first-page":"565","volume":"27","author":"Zhou Y","year":"2010","journal-title":"Chin J Quantum Electron"},{"issue":"5","key":"bibr11-1550147718779678","first-page":"560","volume":"26","author":"Wu Z","year":"2009","journal-title":"Chin J Quantum Electron"},{"issue":"1","key":"bibr12-1550147718779678","first-page":"46","volume":"34","author":"Mao Q","year":"2017","journal-title":"Chin J Quantum Electron"},{"issue":"4","key":"bibr13-1550147718779678","first-page":"452","volume":"32","author":"Wang H","year":"2015","journal-title":"Chin J Quantum Electron"},{"issue":"2","key":"bibr14-1550147718779678","first-page":"178","volume":"32","author":"Zhuansun S","year":"2015","journal-title":"Chin J Quantum Electron"},{"key":"bibr15-1550147718779678","first-page":"325","volume":"4","author":"Gottesman D","year":"2004","journal-title":"Quant Inf Comp"},{"key":"bibr16-1550147718779678","unstructured":"Kollmitzer C, Pivk M. Applied quantum cryptography. Beijing, China: Science Press, 2015, pp.59\u2013104 (in Chinese)."},{"issue":"4","key":"bibr17-1550147718779678","first-page":"449","volume":"31","author":"Wang J","year":"2014","journal-title":"Chin J Quantum Electron"},{"key":"bibr18-1550147718779678","first-page":"651","volume":"13","author":"Zeng G.","year":"2004","journal-title":"Chin J Electron"},{"key":"bibr19-1550147718779678","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-015-0926-z"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718779678","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718779678","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718779678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T06:51:16Z","timestamp":1607323876000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718779678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":19,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["10.1177\/1550147718779678"],"URL":"https:\/\/doi.org\/10.1177\/1550147718779678","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}