{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T21:58:44Z","timestamp":1721339924790},"reference-count":4,"publisher":"Hindawi Limited","issue":"1","license":[{"start":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T00:00:00Z","timestamp":1550707200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T00:00:00Z","timestamp":1550707200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Quantum Engineering"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1002\/que2.6","type":"journal-article","created":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T18:53:38Z","timestamp":1549306418000},"page":"e6","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Introducing\n Quantum Engineering<\/i>"],"prefix":"10.1155","volume":"1","author":[{"given":"Gui\u2010Lu","family":"Long","sequence":"first","affiliation":[{"name":"Tsinghua University Beijing China"}]},{"given":"Peter","family":"Mueller","sequence":"additional","affiliation":[{"name":"IBM Zurich Research Laboratory R\u00fcschlikon Switzerland"}]},{"given":"Jack","family":"Patterson","sequence":"additional","affiliation":[{"name":"Wiley Oxford UK"}]}],"member":"98","published-online":{"date-parts":[[2019,2,21]]},"reference":[{"key":"e_1_2_2_2_1","first-page":"237","article-title":"Zur theorie des gesetzes der energieverteilung im normalspektrum","volume":"2","author":"Planck M","year":"1900","journal-title":"Verhandl Dtsch Phys Ges"},{"key":"e_1_2_2_3_1","unstructured":"BennettCH BrassardG.Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers Systems and Signal Processing;1984;Bangalore India."},{"key":"e_1_2_2_4_1","unstructured":"ShorPW.Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science;1994;Santa Fe NM."},{"key":"e_1_2_2_5_1","doi-asserted-by":"crossref","unstructured":"GroverLK.A fast quantum mechanical algorithm for database search. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing;1996;Philadelphia PA.","DOI":"10.1145\/237814.237866"}],"container-title":["Quantum Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fque2.6","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/que2.6","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/que2.6","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/que2.6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T06:22:59Z","timestamp":1643350979000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/que2.6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,21]]},"references-count":4,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,4,5]]},"published-print":{"date-parts":[[2019,3]]}},"alternative-id":["10.1002\/que2.6"],"URL":"https:\/\/doi.org\/10.1002\/que2.6","archive":["Portico"],"relation":{},"ISSN":["2577-0470","2577-0470"],"issn-type":[{"value":"2577-0470","type":"print"},{"value":"2577-0470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,21]]}}}