{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:29:17Z","timestamp":1755217757994,"version":"3.43.0"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012639","name":"Prince Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3585273","type":"journal-article","created":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T13:45:39Z","timestamp":1751463939000},"page":"115881-115887","source":"Crossref","is-referenced-by-count":0,"title":["Heisenberg Group-Based Digital Signatures for Secure Communications"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7785-9882","authenticated-orcid":false,"given":"Najla","family":"Althuniyan","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1249-6424","authenticated-orcid":false,"given":"Ahmed","family":"Alamer","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Faculty of Science, University of Tabuk, Tabuk, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3507-9367","authenticated-orcid":false,"given":"Awais","family":"Yousaf","sequence":"additional","affiliation":[{"name":"Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8659-1253","authenticated-orcid":false,"given":"Muhammad","family":"Waseem","sequence":"additional","affiliation":[{"name":"Department of Mathematics, The Islamia University of Bahawalpur, Bahawalpur, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2035-0880","authenticated-orcid":false,"given":"Sarah","family":"Aljohani","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Sciences, Prince Sultan University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"issue":"4","key":"ref1","first-page":"653","article-title":"A new digital signature algorithm based on factorization and discrete logarithm problem","volume":"3","author":"Vishnoi","year":"2012","journal-title":"Int. J. Comput. Trends Technol."},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1155\/2019\/2136506"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.jpaa.2015.08.011"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1504\/IJHPSA.2021.115503"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1155\/2023\/2093407"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ACCESS.2019.2909556"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.future.2016.06.003"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s12652-018-0716-4"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.34028\/iajit\/18\/2\/6"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1155\/2021\/6571700"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.5120\/ijca2017913122"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIFS.2017.2659640"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.jisa.2017.08.004"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-319-27659-5_16"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1515\/gcc-2016-0003"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1515\/jmc-2021-0017"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1080\/09720529.2020.1744814"},{"issue":"1","key":"ref18","first-page":"131","article-title":"Metaheuristic algorithms in optimization and its application","volume":"13","author":"Khaleel","year":"2024","journal-title":"Math. Appl."},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/B978-0-443-13925-3.00016-9"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.rineng.2024.102437"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s42979-022-01286-8"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1093\/nsr\/nwac228"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/JBHI.2021.3112693"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11062891.pdf?arnumber=11062891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T18:07:56Z","timestamp":1754417276000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11062891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3585273","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}