{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:58:38Z","timestamp":1730343518892,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,2]]},"DOI":"10.23919\/icac50006.2021.9594228","type":"proceedings-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T22:53:16Z","timestamp":1637016796000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Safe Cloud Computing Using Hash-based Digital Signatures"],"prefix":"10.23919","author":[{"given":"Zainab","family":"Iftikhar","sequence":"first","affiliation":[]},{"given":"Malayka","family":"Iftikhar","sequence":"additional","affiliation":[]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"journal-title":"IT Cloud Services User Survey Pt 2 Top Benefits & Challenges","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891282"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4278"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2932065"},{"key":"ref15","first-page":"65","article-title":"Cloud Service Billing and Service Level Agreement Monitoring based on Blockchain","author":"neidhardt","year":"2018","journal-title":"EMISA"},{"key":"ref16","first-page":"47","article-title":"A proposed risk management framework for cloud computing environment","volume":"14","author":"alosaimi","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5220\/0006362906180625"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1069-y"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00012"},{"key":"ref4","article-title":"Temporal Defense Systems Purchases the First DWave 2000Q Quantum Computer","author":"wave","year":"2017","journal-title":"D-Wave Press Release"},{"key":"ref3","article-title":"A Preview of Bristlecone, Google&#x2019;s New Quantum Processor","author":"kelly","year":"2018","journal-title":"Google Research Blog"},{"key":"ref6","article-title":"Constructing digital signatures from a one-way function","author":"lamport","year":"1979","journal-title":"Technical Report CS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00213"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-642-25405-5_8","article-title":"XMSS-a practical forward secure signature scheme based on minimal security assumptions","author":"buchmann","year":"2011","journal-title":"International Workshop on Post-Quantum Cryptography"},{"key":"ref7","first-page":"218","article-title":"A certified digital signature","author":"merkle","year":"1989","journal-title":"Conference on the Theory and Application of Cryptology"},{"journal-title":"An Analysis of the Cloud Computing Security Problem","year":"2016","author":"almorsy","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00213"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICROIT.2014.6798362"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49384-7_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CNS44998.2019.8952589"},{"key":"ref24","article-title":"U.S","author":"merkle","year":"1982","journal-title":"Patent"},{"key":"ref23","first-page":"369","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1987","journal-title":"Conference on the Theory and Application of Cryptographic Techniques"}],"event":{"name":"2021 26th International Conference on Automation and Computing (ICAC)","start":{"date-parts":[[2021,9,2]]},"location":"Portsmouth, United Kingdom","end":{"date-parts":[[2021,9,4]]}},"container-title":["2021 26th International Conference on Automation and Computing (ICAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9594055\/9594061\/09594228.pdf?arnumber=9594228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T21:01:55Z","timestamp":1646686915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9594228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,2]]},"references-count":24,"URL":"https:\/\/doi.org\/10.23919\/icac50006.2021.9594228","relation":{},"subject":[],"published":{"date-parts":[[2021,9,2]]}}}