{"id":"https://openalex.org/W1969381164","doi":"https://doi.org/10.1145/1413140.1413171","title":"Quantum information","display_name":"Quantum information","publication_year":2008,"publication_date":"2008-05-12","ids":{"openalex":"https://openalex.org/W1969381164","doi":"https://doi.org/10.1145/1413140.1413171","mag":"1969381164"},"language":"en","primary_location":{"id":"doi:10.1145/1413140.1413171","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1413140.1413171","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077374963","display_name":"Ryan S. Bennink","orcid":"https://orcid.org/0000-0002-4810-9369"},"institutions":[{"id":"https://openalex.org/I1289243028","display_name":"Oak Ridge National Laboratory","ror":"https://ror.org/01qz5mb56","country_code":"US","type":"facility","lineage":["https://openalex.org/I1289243028","https://openalex.org/I1330989302","https://openalex.org/I39565521","https://openalex.org/I4210159294"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ryan Bennink","raw_affiliation_strings":["Oak Ridge National Laboratory, Oak Ridge, TN","Oak Ridge National Laboratory, Oak Ridge, TN#TAB#"],"affiliations":[{"raw_affiliation_string":"Oak Ridge National Laboratory, Oak Ridge, TN","institution_ids":["https://openalex.org/I1289243028"]},{"raw_affiliation_string":"Oak Ridge National Laboratory, Oak Ridge, TN#TAB#","institution_ids":["https://openalex.org/I1289243028"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5077374963"],"corresponding_institution_ids":["https://openalex.org/I1289243028"],"apc_list":null,"apc_paid":null,"fwci":0.5721,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.76746742,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.6029999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.6029999852180481,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7078673839569092},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.5245102643966675},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.5167152285575867},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.5107048153877258},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4872542917728424},{"id":"https://openalex.org/keywords/quantum-information-science","display_name":"Quantum information science","score":0.4725612998008728},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4656190872192383},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3965078294277191},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3787846565246582},{"id":"https://openalex.org/keywords/quantum-entanglement","display_name":"Quantum entanglement","score":0.1472901701927185},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13485243916511536},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09963783621788025}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7078673839569092},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.5245102643966675},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.5167152285575867},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.5107048153877258},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4872542917728424},{"id":"https://openalex.org/C5320026","wikidata":"https://www.wikidata.org/wiki/Q2122216","display_name":"Quantum information science","level":4,"score":0.4725612998008728},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4656190872192383},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3965078294277191},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3787846565246582},{"id":"https://openalex.org/C121040770","wikidata":"https://www.wikidata.org/wiki/Q215675","display_name":"Quantum entanglement","level":3,"score":0.1472901701927185},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13485243916511536},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09963783621788025},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1413140.1413171","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1413140.1413171","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1645513321","https://openalex.org/W2033139110","https://openalex.org/W4226551905","https://openalex.org/W2045780663","https://openalex.org/W1633947052","https://openalex.org/W4221152360","https://openalex.org/W3035556600","https://openalex.org/W4387121290","https://openalex.org/W2127884933","https://openalex.org/W4388768821"],"abstract_inverted_index":{"Modern":[0],"society":[1],"is":[2,26,30],"shaped":[3],"by":[4,58],"the":[5,59,114,129,132,141],"ability":[6],"to":[7,19,137],"transmit,":[8],"manipulate,":[9],"and":[10,28,55,84,102],"store":[11,138],"large":[12],"amounts":[13],"of":[14,21,62,73,124,131],"information.":[15,142],"Although":[16],"we":[17,37],"tend":[18],"think":[20],"information":[22,25,39,126],"as":[23,110],"abstract,":[24],"physical,":[27],"computing":[29],"a":[31,41,91],"physical":[32,46,134],"process.":[33],"How":[34],"then":[35],"should":[36],"understand":[38],"in":[40,44,50,86],"quantum":[42,92,117],"world,":[43],"which":[45],"systems":[47],"may":[48],"exist":[49],"multiple":[51],"states":[52],"at":[53,128],"once":[54],"are":[56],"altered":[57],"very":[60],"act":[61],"observation?":[63],"This":[64],"question":[65],"has":[66],"evolved":[67],"into":[68,99],"an":[69,121],"exciting":[70],"new":[71],"field":[72],"research":[74],"called":[75],"Quantum":[76],"Information":[77],"(QI).":[78],"QI":[79],"challenges":[80],"many":[81],"accepted":[82],"rules":[83],"practices":[85],"computer":[87,93],"science.":[88],"For":[89],"example,":[90],"would":[94,103,119],"turn":[95],"certain":[96],"\"hard\"":[97],"problems":[98],"\"soft\"":[100],"problems,":[101],"render":[104],"common":[105],"computationally-secure":[106],"encryption":[107],"methods":[108],"(such":[109],"RSA)":[111],"insecure.":[112],"At":[113],"same":[115],"time,":[116],"communication":[118],"provide":[120],"unprecedented":[122],"kind":[123],"intrinsic":[125],"security":[127],"level":[130],"smallest":[133],"objects":[135],"used":[136],"or":[139],"transmit":[140]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
