{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:08:19Z","timestamp":1764688099872,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545389","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"01-06","source":"Crossref","is-referenced-by-count":4,"title":["Time-Aware Re-Synthesis for Secure Quantum Systems"],"prefix":"10.1109","author":[{"given":"Christian","family":"Rasmussen","sequence":"first","affiliation":[{"name":"City College of New York, City University of New York,New York,USA"}]},{"given":"Samah Mohamed","family":"Saeed","sequence":"additional","affiliation":[{"name":"City College of New York, City University of New York,New York,USA"}]}],"member":"263","reference":[{"volume-title":"Summary of the workshop on cybersecurity of quantum computing","year":"2021","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.012318"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/QCE49297.2020.00036"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3548693"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/QCE53715.2022.00068"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507739"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1090\/gsm\/047","volume-title":"Classical and Quantum Computation","author":"Kitaev","year":"2002"},{"journal-title":"Toward privacy in quantum program execution on untrusted quantum cloud computing machines for business-sensitive quantum needs","year":"2023","author":"Patel","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/lca.2023.3325852"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424311"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511976667"},{"key":"ref12","volume":"4","author":"Younis","year":"2021","journal-title":"Berkeley quantum synthesis toolkit (bqskit) v1"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545389.pdf?arnumber=10545389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T18:29:10Z","timestamp":1719340150000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545389","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}