{"id":408,"date":"2016-04-13T22:41:41","date_gmt":"2016-04-13T20:41:41","guid":{"rendered":"https:\/\/webs.uab.cat\/giq\/biblio\/full-security-quantum-key-distribution-no-signaling-constraints\/"},"modified":"2016-04-13T22:41:41","modified_gmt":"2016-04-13T20:41:41","slug":"full-security-quantum-key-distribution-no-signaling-constraints","status":"publish","type":"biblio","link":"https:\/\/webs.uab.cat\/giq\/biblio\/full-security-quantum-key-distribution-no-signaling-constraints\/","title":{"rendered":"Full Security of Quantum Key Distribution From No-Signaling Constraints"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":20,"featured_media":0,"template":"","class_list":["post-408","biblio","type-biblio","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/webs.uab.cat\/giq\/wp-json\/wp\/v2\/biblio\/408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webs.uab.cat\/giq\/wp-json\/wp\/v2\/biblio"}],"about":[{"href":"https:\/\/webs.uab.cat\/giq\/wp-json\/wp\/v2\/types\/biblio"}],"author":[{"embeddable":true,"href":"https:\/\/webs.uab.cat\/giq\/wp-json\/wp\/v2\/users\/20"}],"wp:attachment":[{"href":"https:\/\/webs.uab.cat\/giq\/wp-json\/wp\/v2\/media?parent=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}