{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T13:18:16Z","timestamp":1771679896664,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62222208"],"award-info":[{"award-number":["62222208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["21JCZDJC00190"],"award-info":[{"award-number":["21JCZDJC00190"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["21JCZXJC00100"],"award-info":[{"award-number":["21JCZXJC00100"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Henan Key Laboratory of Network Cryptography Technology","award":["LNCT2022-A02"],"award-info":[{"award-number":["LNCT2022-A02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/tsc.2023.3331000","type":"journal-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T19:02:03Z","timestamp":1699470123000},"page":"1140-1153","source":"Crossref","is-referenced-by-count":7,"title":["QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8014-8643","authenticated-orcid":false,"given":"Jingwei","family":"Jiang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1667-2237","authenticated-orcid":false,"given":"Ding","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Data and Intelligent System Security, Ministry of Education, Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6925-3039","authenticated-orcid":false,"given":"Guoyin","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"The digitization of the world from edge to core","volume":"16","author":"Rydning","year":"2018","journal-title":"Framingham: Int. Data Corporation"},{"key":"ref2","article-title":"Cloud services may become the biggest source of DDoS attacks","author":"Hui","year":"2019"},{"key":"ref3","article-title":"Building a distributed network in the cloud: Using amazon EC2 to break passwords?","author":"Andrey","year":"2017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3074146"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3517389"},{"key":"ref6","article-title":"Uncovering impact of mental models towards adoption of multi-device crypto-wallets","author":"Mangipudi","year":"2022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046758"},{"key":"ref9","article-title":"Google cloud key management service","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363196"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2016.30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_23"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2605087"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996806"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93638-3_27"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_17"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833598"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24298"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-63-2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382252"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813722"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/nature08812"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.22331\/q-2018-08-06-79"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.8240","article-title":"Status report on the first round of the nist post-quantum cryptography standardization process","author":"Alagic","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3040776"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.40"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_19"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_17"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_4"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_15"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_13"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_18"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814628"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3129512"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_20"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2975792"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70802"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3089511"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3228493"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3472753"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"ref57","article-title":"The opaque asymmetric pake protocol draft-irtf-cfrg-opaque-11","volume-title":"IETF Datatracker","author":"Bourdrez","year":"2023"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2832984"},{"key":"ref59","first-page":"1","article-title":"No single silver bullet: Measuring the accuracy of password strength meters","volume-title":"Proc. USENIX Secur.","author":"Wang"},{"key":"ref60","first-page":"581","article-title":"Do password managers nudge secure (random) passwords?","volume-title":"Proc. 18th USENIX Conf. Usable Privacy Secur.","author":"Zibaei"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1049\/el:19740097"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/s20072039"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988765"},{"key":"ref64","article-title":"Status report on the second round of the nist post-quantum cryptography standardization process","author":"Alagic","year":"2020"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"ref66","article-title":"Verifier-based password-authenticated key exchange: New models and constructions","author":"Benhamouda","year":"2013"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75248-4_10"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/BF01581144"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9105-2"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/10554674\/10313065.pdf?arnumber=10313065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T13:28:39Z","timestamp":1719408519000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10313065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":70,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2023.3331000","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}