{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:06:21Z","timestamp":1745946381626,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031579417"},{"type":"electronic","value":"9783031579424"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57942-4_34","type":"book-chapter","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:01:52Z","timestamp":1712635312000},"page":"354-363","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Quantum Advancements in\u00a0Securing Networking Infrastructures"],"prefix":"10.1007","author":[{"given":"Hadi","family":"Salloum","sequence":"first","affiliation":[]},{"given":"Murhaf","family":"Alawir","sequence":"additional","affiliation":[]},{"given":"Mohammad Anas","family":"Alatasi","sequence":"additional","affiliation":[]},{"given":"Saleem","family":"Asekrea","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Mazzara","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Bahrami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Nurhadi, A.I., Syambas, N.R.: Quantum key distribution (QKD) protocols: a survey. In: 2018 4th International Conference on Wireless and Telematics (ICWT), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/ICWT.2018.8527822"},{"issue":"10","key":"34_CR2","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aade06","volume":"20","author":"A Huang","year":"2018","unstructured":"Huang, A., Barz, S., Andersson, E., Makarov, V.: Implementation vulnerabilities in general quantum cryptography. New J. Phys. 20(10), 103016 (2018)","journal-title":"New J. Phys."},{"issue":"4","key":"34_CR3","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1964\/4\/042002","volume":"1964","author":"A Vaishnavi","year":"2021","unstructured":"Vaishnavi, A., Pillai, S.: Cybersecurity in the quantum era-a study of perceived risks in conventional cryptography and discussion on post quantum methods. J. Phys. Conf. Ser. 1964(4), 042002 (2021)","journal-title":"J. Phys. Conf. Ser."},{"issue":"4","key":"34_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.3390\/cryptography5040038","volume":"5","author":"C Balamurugan","year":"2021","unstructured":"Balamurugan, C., Singh, K., Ganesan, G., Rajarajan, M.: Post-quantum and code-based cryptography-some prospective research directions. Cryptography 5(4), 38 (2021)","journal-title":"Cryptography"},{"issue":"5","key":"34_CR5","first-page":"1","volume":"9","author":"CH Ugwuishiwu","year":"2020","unstructured":"Ugwuishiwu, C.H., Orji, U.E., Ugwu, C.I., Asogwa, C.N.: An overview of quantum cryptography and Shor\u2019s algorithm. Int. J. Adv. Trends. Comput. Sci. Eng. 9(5), 1\u20139 (2020)","journal-title":"Int. J. Adv. Trends. Comput. Sci. Eng."},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Van Assche, G.: Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, Cambridge (2006)","DOI":"10.1017\/CBO9780511617744"},{"key":"34_CR7","unstructured":"Naber, G.: Foundations of Quantum Mechanics (2016)"},{"key":"34_CR8","unstructured":"Mackey, G.W.: Mathematical Foundations of Quantum Mechanics. Courier Corporation (2013)"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Salloum, H., et al.: Integration of machine learning with quantum annealing. In: International Conference on Advanced Information Networking and Applications. Springer (2024)","DOI":"10.1007\/978-3-031-57870-0_30"},{"issue":"6","key":"34_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Post-quantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. (CSUR) 51(6), 1\u201341 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"34_CR11","first-page":"1","volume":"5","author":"S Charjan","year":"2015","unstructured":"Charjan, S., Kulkarni, D.H.: Quantum key distribution by exploitation public key cryptography (ECC) in resource constrained devices. Int. J. 5, 1\u20138 (2015)","journal-title":"Int. J."},{"issue":"6277","key":"34_CR12","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1126\/science.aad9480","volume":"351","author":"T Monz","year":"2016","unstructured":"Monz, T., et al.: Realization of a scalable Shor algorithm. Science 351(6277), 1068\u20131070 (2016)","journal-title":"Science"},{"issue":"6195","key":"34_CR13","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1126\/science.1252319","volume":"345","author":"TF R\u00f8nnow","year":"2014","unstructured":"R\u00f8nnow, T.F., et al.: Defining and detecting quantum speedup. Science 345(6195), 420\u2013424 (2014)","journal-title":"Science"},{"key":"34_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/9780470181386","volume-title":"Quantum Computing Explained","author":"D McMahon","year":"2007","unstructured":"McMahon, D.: Quantum Computing Explained. John Wiley & Sons, New York (2007)"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Mozaffari-Kermani, M., Azarderakhsh, R.: Reliable hash trees for post-quantum stateless cryptographic hash-based signatures. In: 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), pp. 103\u2013108. IEEE (2015)","DOI":"10.1109\/DFT.2015.7315144"},{"issue":"5","key":"34_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3402192","volume":"53","author":"M Mehic","year":"2020","unstructured":"Mehic, M., et al.: Quantum key distribution: a networking perspective. ACM Comput. Surv. (CSUR) 53(5), 1\u201341 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"34_CR17","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2416\/1\/012001","volume":"2416","author":"M Stanley","year":"2022","unstructured":"Stanley, M., Gui, Y., Unnikrishnan, D., Hall, S.R.G., Fatadin, I.: Recent progress in quantum key distribution network deployments and standards. J. Phys. Conf. Ser. 2416(1), 012001 (2022)","journal-title":"J. Phys. Conf. Ser."},{"issue":"4","key":"34_CR18","first-page":"1","volume":"12","author":"NN Torres","year":"2021","unstructured":"Torres, N.N., Garcia, J.C.S., Guancha, E.A.V.: Systems security affectation with the implementation of quantum computing. Int. J. Adv. Comput. Sci. App. 12(4), 1\u201311 (2021)","journal-title":"Int. J. Adv. Comput. Sci. App."},{"key":"34_CR19","doi-asserted-by":"publisher","first-page":"157356","DOI":"10.1109\/ACCESS.2020.3019345","volume":"8","author":"OS Althobaiti","year":"2020","unstructured":"Althobaiti, O.S., Dohler, M.: Cybersecurity challenges associated with the Internet of Things in a post-quantum world. IEEE Access. 8, 157356\u2013157381 (2020)","journal-title":"IEEE Access."},{"issue":"2","key":"34_CR20","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"34_CR21","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"34_CR22","volume-title":"Quantum Money","author":"PW Shor","year":"2012","unstructured":"Shor, P.W., Farhi, E., Gosset, D., Hassidim, A., Lutomirski, A.: Quantum Money, vol. 19. MIT, Cambridge (2012)"},{"issue":"10","key":"34_CR23","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s11128-022-03712-5","volume":"21","author":"R Kuang","year":"2022","unstructured":"Kuang, R., Perepechaenko, M., Barbeau, M.: A new post-quantum multivariate polynomial public key encapsulation algorithm. Quant. Inf. Process. 21(10), 360 (2022)","journal-title":"Quant. Inf. Process."},{"key":"34_CR24","unstructured":"Eddin, S., et al.: Quantum microservices: transforming software architecture with quantum computing. In: International Conference on Advanced Information Networking and Applications. Springer (2024)"},{"key":"34_CR25","doi-asserted-by":"publisher","first-page":"128801","DOI":"10.1109\/ACCESS.2023.3333020","volume":"11","author":"S Bajri\u0107","year":"2023","unstructured":"Bajri\u0107, S.: Enabling secure and trustworthy quantum networks: current state-of-the-art, key challenges, and potential solutions. IEEE Access 11, 128801\u2013128809 (2023)","journal-title":"IEEE Access"},{"issue":"3","key":"34_CR26","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., et al.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"34_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/e18010020","volume":"18","author":"VC Usenko","year":"2016","unstructured":"Usenko, V.C., Filip, R.: Trusted noise in continuous-variable quantum key distribution: a threat and a defense. Entropy 18(1), 20 (2016)","journal-title":"Entropy"},{"issue":"16","key":"34_CR28","doi-asserted-by":"publisher","first-page":"25859","DOI":"10.1364\/OE.432944","volume":"29","author":"Y-H Yang","year":"2021","unstructured":"Yang, Y.-H., et al.: All optical metropolitan quantum key distribution network with post-quantum cryptography authentication. Opt. Express. 29(16), 25859\u201325867 (2021)","journal-title":"Opt. Express."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57942-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T22:45:40Z","timestamp":1731710740000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57942-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031579417","9783031579424"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57942-4_34","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}