{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T05:18:52Z","timestamp":1734067132405,"version":"3.30.2"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.23919\/transcom.2024cei0007","type":"journal-article","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T18:12:15Z","timestamp":1724350335000},"page":"899-906","source":"Crossref","is-referenced-by-count":0,"title":["Disaggregated Architecture of Post-Quantum Security for Optical and Packet Transport Equipment"],"prefix":"10.23919","volume":"E107-B","author":[{"given":"Atsushi","family":"Taniguchi","sequence":"first","affiliation":[{"name":"NTT Network Innovation Laboratories,Yokosuka-shi,Japan,239-0847"}]},{"given":"Yasuhiro","family":"Mochida","sequence":"additional","affiliation":[{"name":"NTT Network Innovation Laboratories,Yokosuka-shi,Japan,239-0847"}]},{"given":"Sakae","family":"Chikara","sequence":"additional","affiliation":[{"name":"NTT Social Informatics Laboratories,Musashino-shi,Japan,180-8585"}]},{"given":"Yasuyuki","family":"Sanari","sequence":"additional","affiliation":[{"name":"NTT Network Innovation Laboratories,Yokosuka-shi,Japan,239-0847"}]},{"given":"Keizo","family":"Murakami","sequence":"additional","affiliation":[{"name":"NTT Social Informatics Laboratories,Musashino-shi,Japan,180-8585"}]},{"given":"Momoko","family":"Miura","sequence":"additional","affiliation":[{"name":"NTT Network Innovation Laboratories,Yokosuka-shi,Japan,239-0847"}]},{"given":"Hirokazu","family":"Takahashi","sequence":"additional","affiliation":[{"name":"NTT Network Innovation Laboratories,Yokosuka-shi,Japan,239-0847"}]},{"given":"Koichi","family":"Takasugi","sequence":"additional","affiliation":[{"name":"NTT Network Innovation Laboratories,Yokosuka-shi,Japan,239-0847"}]},{"given":"Hiroki","family":"Itoh","sequence":"additional","affiliation":[{"name":"NTT Social Informatics Laboratories,Musashino-shi,Japan,180-8585"}]},{"given":"Daigoro","family":"Yokozeki","sequence":"additional","affiliation":[{"name":"NTT Social Informatics Laboratories,Musashino-shi,Japan,180-8585"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04623-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IIPHDW.2019.8755433"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.53829\/ntr202304fa8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2018.2843136"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-019-0221-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1364\/OE.19.010387"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.53829\/ntr202201fa6"},{"journal-title":"Hybrid Key Exchange in TLS 1.3","year":"2023","author":"Stebila","key":"ref9"},{"journal-title":"IOWN Global Forum V.1.0","article-title":"Technology outlook of Information Security","year":"2023","key":"ref10"},{"journal-title":"ITU-T Y.QKDN_KM: Key management for quantum key distribution network","year":"2019","key":"ref11"},{"journal-title":"ETSI GS QKD 014 V.1.1.1","article-title":"Quantum Key Distribution (QKD); Protocol and data format of REST-based delivery API","year":"2019","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.403205"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.380721"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266446"},{"key":"ref16","first-page":"05","article-title":"Disaggregation architecture of quantum-safe security for optical & packet transport equipment","volume-title":"IEICE Proceedings Series","volume":"79","author":"Taniguchi","year":"2023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2023.10225636"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.12006"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30731-7_1"},{"key":"ref20","first-page":"177","article-title":"Key management of quantum generated keys in IPsec","author":"Neppach","year":"2008","journal-title":"SECRYPT"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3309051"},{"journal-title":"Limits on authenticated encryption use in TLS","author":"Luykx","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78262-1_300272"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BMSB58369.2023.10211442"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-018-9212-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1201\/9780203888933-11"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10400553\/10794625\/10643858.pdf?arnumber=10643858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T07:11:53Z","timestamp":1733987513000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10643858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":26,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.23919\/transcom.2024cei0007","relation":{},"ISSN":["1745-1345","0916-8516"],"issn-type":[{"type":"electronic","value":"1745-1345"},{"type":"print","value":"0916-8516"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}