{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:50:58Z","timestamp":1774630258484,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100004356","name":"Nokia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004356","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3120143","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T09:32:29Z","timestamp":1634290349000},"page":"142314-142327","source":"Crossref","is-referenced-by-count":103,"title":["Security and Trust in the 6G Era"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6408-5697","authenticated-orcid":false,"given":"Volker","family":"Ziegler","sequence":"first","affiliation":[]},{"given":"Peter","family":"Schneider","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6144-7648","authenticated-orcid":false,"given":"Harish","family":"Viswanathan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8491-7355","authenticated-orcid":false,"given":"Michael","family":"Montag","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0817-6775","authenticated-orcid":false,"given":"Satish","family":"Kanugovi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6209-5699","authenticated-orcid":false,"given":"Ali","family":"Rezaki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55366-1_6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120011"},{"key":"ref33","article-title":"Quantum-secured blockchain","author":"kiktenko","year":"2017","journal-title":"arXiv 1705 09258"},{"key":"ref32","first-page":"1644","article-title":"Quantum cryptography: A new generation of information technology security system","author":"sharbaf","year":"2009","journal-title":"Proc Int Conf Inf Technol New Generations"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.15325\/BLTJ.2018.2860381"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909490"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2800747"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346844"},{"key":"ref35","year":"2018","journal-title":"Study on supporting 256-bit algorithms for 5G"},{"key":"ref34","year":"2020","journal-title":"Post Qunatum Cryptography"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3054833"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3103735"},{"key":"ref12","year":"2021","journal-title":"About 3GPP"},{"key":"ref13","year":"2013","journal-title":"NFV"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-79733-0","author":"peterson","year":"2020","journal-title":"Software-Defined Networks A Systems Approach"},{"key":"ref15","year":"2020","journal-title":"Cloud Native Security White Paper"},{"key":"ref16","year":"2020","journal-title":"O-RAN Use Cases and Deployment Scenarios"},{"key":"ref17","year":"2017","journal-title":"Security architecture and procedures for 5G System"},{"key":"ref18","year":"2021","journal-title":"CNCF"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.4541051"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2019.2899083"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00057"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921522"},{"key":"ref27","year":"2020","journal-title":"Hardware-Enabled Security for Server Platforms Enabling a Layered Approach to Platform Security for Cloud and Edge Computing Use Cases"},{"key":"ref6","first-page":"3","article-title":"Millimeter and THz wave for 5G and beyond","volume":"16","author":"zhang","year":"2019","journal-title":"China Commun"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010896"},{"key":"ref29","article-title":"Enabling privacy-preserving, compute- and data-intensive computing using heterogeneous trusted execution environment","author":"zhu","year":"2019","journal-title":"arXiv 1904 04782"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.09.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-DAT49148.2020.9196309"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025032"},{"key":"ref9","author":"ylianttila","year":"2020","journal-title":"6g white paper Research challenges for trust security and privacy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981745"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.031"},{"key":"ref22","year":"2021","journal-title":"Business Process Framework (eTOM)"},{"key":"ref21","year":"2021","journal-title":"Hexa-X EU H2020-ICT-2020-2 6G Vision Use Cases and Key Societal Values"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3035006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00014"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083832"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.60"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890557"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845126"},{"key":"ref25","article-title":"Neural code search revisited: Enhancing code snippet retrieval through natural language intent","author":"heyman","year":"2020","journal-title":"arXiv 2008 12193"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09570274.pdf?arnumber=9570274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T10:15:29Z","timestamp":1673518529000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9570274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3120143","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}