{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:39:15Z","timestamp":1725773955652},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642544286"},{"type":"electronic","value":"9783642544293"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54429-3_1","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:33:06Z","timestamp":1394184786000},"page":"1-12","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Weak Coin Flipping in a Device-Independent Setting"],"prefix":"10.1007","author":[{"given":"Nati","family":"Aharon","sequence":"first","affiliation":[]},{"given":"Andr\u00e9","family":"Chailloux","sequence":"additional","affiliation":[]},{"given":"Iordanis","family":"Kerenidis","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Massar","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Pironio","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Silman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Barrett, J., et al.: Phys. Rev. Lett. 95, 010503 (2005)","DOI":"10.1103\/PhysRevLett.95.140401"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ac\u00edn, A., et al.: Phys. Rev. Lett. 98, 230501 (2007)","DOI":"10.1103\/PhysRevLett.98.230501"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Pironio, S., et al.: New J. Phys. 11, 045021 (2009)","DOI":"10.1088\/1367-2630\/11\/4\/045021"},{"key":"1_CR4","doi-asserted-by":"crossref","first-page":"103037","DOI":"10.1088\/1367-2630\/11\/10\/103037","volume":"11","author":"M. McKague","year":"2009","unstructured":"McKague, M.: New J. Phys. 11, 103037 (2009)","journal-title":"New J. Phys."},{"key":"1_CR5","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1038\/ncomms1244","volume":"2","author":"Ll Masanes","year":"2011","unstructured":"Masanes, Ll., Pironio, S., Ac\u00edn, A.: Nat. Commun. 2, 238 (2011)","journal-title":"Nat. Commun."},{"key":"1_CR6","unstructured":"Hanggi, E., Renner, R.: arXiv:1009.1833"},{"key":"1_CR7","series-title":"LNCS","first-page":"72","volume-title":"ICALP 2006","author":"F Magniez","year":"2006","unstructured":"Magniez, F., Mayers, D., Mosca, M., Ollivier, H.: Self-testing of quantum circuits. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4051, pp. 72\u201383. Springer, Heidelberg (2006)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Ac\u00edn, A., Gisin, N., Masanes, Ll.: Phys. Rev. Lett. 97, 120405 (2006)","DOI":"10.1103\/PhysRevLett.97.120405"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Xu, F., et al.: New J. Phys. 12, 113026 (2010) arXiv:1005.2376 [quant-ph]","DOI":"10.1088\/1367-2630\/12\/11\/113026"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Lydersen, L., et al.: Nat. Photonics 4, 686 (2010)","DOI":"10.1038\/nphoton.2010.214"},{"key":"1_CR11","doi-asserted-by":"crossref","first-page":"095305","DOI":"10.1088\/1751-8113\/44\/9\/095305","volume":"44","author":"R. Colbeck","year":"2011","unstructured":"Colbeck, R., Kent, A.: J. Phys. A: Math. Theor. 44, 095305 (2011)","journal-title":"J. Phys. A: Math. Theor."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Pironio, S., et al.: Nature 464, 1021 (2010)","DOI":"10.1038\/nature09008"},{"key":"1_CR13","doi-asserted-by":"crossref","first-page":"273","DOI":"10.26421\/QIC4.4-3","volume":"4","author":"D. Mayers","year":"2004","unstructured":"Mayers, D., Yao, A.: Quantum Inform. Comput. 4, 273 (2004)","journal-title":"Quantum Inform. Comput."},{"key":"1_CR14","series-title":"LNCS","first-page":"113","volume-title":"TQC 2010","author":"M McKague","year":"2011","unstructured":"McKague, M., Mosca, M.: Generalized self-testing and the security of the 6-state protocol. In: van Dam, W., Kendon, V.M., Severini, S. (eds.) TQC 2010. LNCS, vol. 6519, pp. 113\u2013130. Springer, Heidelberg (2011)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Bancal, J.-D., et al.: Phys. Rev. Lett. 106, 250404 (2011) arXiv:1102.0197 [quant-ph]","DOI":"10.1103\/PhysRevLett.106.250404"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Silman, J., et al.: Phys. Rev. Lett. 106, 220501 (2011)","DOI":"10.1103\/PhysRevLett.106.220501"},{"key":"1_CR17","first-page":"74","volume-title":"Bell\u2019s Theorem, Quantum Theory, and Conceptions of the Universe","author":"DM Greenberger","year":"1989","unstructured":"Greenberger, D.M., Horne, M.A., Zeilinger, A.: Going beyond Bell\u2019s theorem. In: Kafatos, M. (ed.) Bell\u2019s Theorem, Quantum Theory, and Conceptions of the Universe, p. 74. Kluwer, Dordrecht (1989)"},{"key":"1_CR18","first-page":"9","volume":"43","author":"N.D. Mermin","year":"1990","unstructured":"Mermin, N.D.: Phys. Today 43, 9 (1990)","journal-title":"Phys. Today"},{"key":"1_CR19","unstructured":"Mochon, C.: arXiv:0711.4114 [quant-ph]"},{"key":"1_CR20","unstructured":"Chailloux, A., Kerenidis, I.: In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, p. 527. CS Press (2009)"},{"key":"1_CR21","unstructured":"Chailloux, A., Kerenidis, I.: In: Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science, p. 354. CS Press (2011) arXiv:1102.1678v1 [quant-ph]"},{"key":"1_CR22","unstructured":"Blum, M.: In: Gersho, A., Santa Barbara, U.C. (eds.) Advances in Cryptology: a report on CRYPTO 81. Department of Electrical and Computer Engineering, ECE Report No. 82\u201304, 1982, p. 11"},{"key":"1_CR23","unstructured":"Aharonov, D., et al.: In: Proceedings of the 32nd Annual ACM Symposium on the Theory of Computing, p. 705. ACM Press (2000)"},{"key":"1_CR24","unstructured":"Ambainis, A.: In: Proceedings of the 33rd Annual ACM Symposium on the Theory of Computing, p. 134. ACM Press (2001)"},{"key":"1_CR25","unstructured":"Kitaev, A.: Unpublished. Proof reproduced in [29]"},{"key":"1_CR26","doi-asserted-by":"crossref","first-page":"012310","DOI":"10.1103\/PhysRevA.65.012310","volume":"65","author":"R.W. Spekkens","year":"2001","unstructured":"Spekkens, R.W., Rudolph, T.: Phys. Rev. A 65, 012310 (2001)","journal-title":"Phys. Rev. A"},{"key":"1_CR27","doi-asserted-by":"crossref","first-page":"227901","DOI":"10.1103\/PhysRevLett.89.227901","volume":"89","author":"R.W. Spekkens","year":"2002","unstructured":"Spekkens, R.W., Rudolph, T.: Phys. Rev. Lett. 89, 227901 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"1_CR28","unstructured":"Mochon, C.: In: Proceedings of the 45th Annual IEEE Symposium on the Foundations of Computer Science, p. 2. CS Press (2004)"},{"key":"1_CR29","doi-asserted-by":"crossref","first-page":"022341","DOI":"10.1103\/PhysRevA.72.022341","volume":"72","author":"C. Mochon","year":"2005","unstructured":"Mochon, C.: Phys. Rev. A 72, 022341 (2005)","journal-title":"Phys. Rev. A"},{"key":"1_CR30","unstructured":"Ambainis, A., et al.: In: Proceedings of the 19th Annual IEEE Conference on Computational Complexity, p. 250. CS Press (2004)"},{"key":"1_CR31","doi-asserted-by":"crossref","first-page":"022322","DOI":"10.1103\/PhysRevA.69.022322","volume":"69","author":"J. Barrett","year":"2004","unstructured":"Barrett, J., Massar, S.: Phys. Rev. A 69, 022322 (2004)","journal-title":"Phys. Rev. A"},{"key":"1_CR32","doi-asserted-by":"crossref","first-page":"052310","DOI":"10.1103\/PhysRevA.70.052310","volume":"70","author":"J. Barrett","year":"2004","unstructured":"Barrett, J., Massar, S.: Phys. Rev. A 70, 052310 (2004)","journal-title":"Phys. Rev. A"},{"key":"1_CR33","doi-asserted-by":"crossref","first-page":"033027","DOI":"10.1088\/1367-2630\/12\/3\/033027","volume":"12","author":"N. Aharon","year":"2010","unstructured":"Aharon, N., Silman, J.: New J. Phys. 12, 033027 (2010)","journal-title":"New J. Phys."},{"key":"1_CR34","unstructured":"Ganz, M.: arXiv:0910.4952 [quant-ph]"},{"key":"1_CR35","doi-asserted-by":"crossref","first-page":"5382","DOI":"10.1103\/PhysRevLett.83.5382","volume":"83","author":"A. Kent","year":"1999","unstructured":"Kent, A.: Phys. Rev. Lett. 83, 5382 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"1_CR36","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1023\/A:1018868326838","volume":"29","author":"L. Vaidman","year":"1999","unstructured":"Vaidman, L.: Found. Phys. 29, 615 (1999)","journal-title":"Found. Phys."},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Clauser, J.F., et al.: Phys. Rev. Lett. 23, 880 (1969)","DOI":"10.1103\/PhysRevLett.23.880"},{"key":"1_CR38","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/BF00417500","volume":"4","author":"B.S. Cirel\u2019son","year":"1980","unstructured":"Cirel\u2019son, B.S.: Lett. Math. Phys. 4, 93 (1980)","journal-title":"Lett. Math. Phys."},{"key":"1_CR39","first-page":"329","volume":"8","author":"B. Tsirelson","year":"1993","unstructured":"Tsirelson, B.: Hadronic J. Suppl. 8, 329 (1993)","journal-title":"Hadronic J. Suppl."},{"key":"1_CR40","doi-asserted-by":"crossref","first-page":"050503","DOI":"10.1103\/PhysRevLett.97.050503","volume":"97","author":"Ll Masanes","year":"2006","unstructured":"Masanes, Ll.: Phys. Rev. Lett. 97, 050503 (2006)","journal-title":"Phys. Rev. Lett."}],"container-title":["Lecture Notes in Computer Science","Theory of Quantum Computation, Communication, and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54429-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T22:49:58Z","timestamp":1676846998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54429-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642544286","9783642544293"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54429-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}