{"id":"https://openalex.org/W2790867243","doi":"https://doi.org/10.1109/access.2018.2799879","title":"Secure Quantum Steganography Protocol for Fog Cloud Internet of Things","display_name":"Secure Quantum Steganography Protocol for Fog Cloud Internet of Things","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2790867243","doi":"https://doi.org/10.1109/access.2018.2799879","mag":"2790867243"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2799879","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2799879","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2799879","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051434121","display_name":"Ahmed A. Abd El\u2010Latif","orcid":"https://orcid.org/0000-0002-5068-2033"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Ahmed A. Abd El-Latif","raw_affiliation_strings":["Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom, Egypt","ORCiD"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom, Egypt","institution_ids":["https://openalex.org/I63601056"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082949070","display_name":"Bassem Abd-El-Atty","orcid":"https://orcid.org/0000-0003-4739-0037"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Bassem Abd-El-Atty","raw_affiliation_strings":["Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037865550","display_name":"M. Shamim Hossain","orcid":"https://orcid.org/0000-0001-5906-9422"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"M. Shamim Hossain","raw_affiliation_strings":["Department of Software engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","ORCiD"],"affiliations":[{"raw_affiliation_string":"Department of Software engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080087070","display_name":"Samir Elmougy","orcid":"https://orcid.org/0000-0002-0765-5355"},"institutions":[{"id":"https://openalex.org/I159247623","display_name":"Mansoura University","ror":"https://ror.org/01k8vtd75","country_code":"EG","type":"education","lineage":["https://openalex.org/I159247623"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Samir Elmougy","raw_affiliation_strings":["Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt","institution_ids":["https://openalex.org/I159247623"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077725442","display_name":"Ahmed Ghoneim","orcid":"https://orcid.org/0000-0003-2076-8925"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ahmed Ghoneim","raw_affiliation_strings":["Department of Software engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","ORCiD"],"affiliations":[{"raw_affiliation_string":"Department of Software engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5051434121"],"corresponding_institution_ids":["https://openalex.org/I63601056"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":12.5421,"has_fulltext":false,"cited_by_count":121,"citation_normalized_percentile":{"value":0.98811396,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"6","issue":null,"first_page":"10332","last_page":"10340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8252211809158325},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.7081007957458496},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.660124659538269},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6310561895370483},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.614893913269043},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5096127986907959},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.48317423462867737},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4824853241443634},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4109388589859009},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10634443163871765},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.08114999532699585},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07717534899711609}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8252211809158325},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.7081007957458496},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.660124659538269},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6310561895370483},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.614893913269043},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5096127986907959},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.48317423462867737},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4824853241443634},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4109388589859009},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10634443163871765},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.08114999532699585},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07717534899711609},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2799879","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2799879","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:dbee1d2edaa94d788deb8e40b5ac089c","is_oa":true,"landing_page_url":"https://doaj.org/article/dbee1d2edaa94d788deb8e40b5ac089c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 10332-10340 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2799879","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2799879","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6299999952316284,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5968684117","display_name":null,"funder_award_id":"RGP-229","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W67681254","https://openalex.org/W657368097","https://openalex.org/W1566686886","https://openalex.org/W1811972587","https://openalex.org/W1965673630","https://openalex.org/W1965983842","https://openalex.org/W1974257503","https://openalex.org/W1977935012","https://openalex.org/W1978553093","https://openalex.org/W1981300003","https://openalex.org/W1997401420","https://openalex.org/W1998600416","https://openalex.org/W2010990853","https://openalex.org/W2011884690","https://openalex.org/W2013432833","https://openalex.org/W2015179126","https://openalex.org/W2015642537","https://openalex.org/W2019018899","https://openalex.org/W2019204303","https://openalex.org/W2027822092","https://openalex.org/W2029594926","https://openalex.org/W2032033285","https://openalex.org/W2047471991","https://openalex.org/W2051051926","https://openalex.org/W2057968778","https://openalex.org/W2063077266","https://openalex.org/W2076085043","https://openalex.org/W2114623221","https://openalex.org/W2143202681","https://openalex.org/W2220281005","https://openalex.org/W2301090655","https://openalex.org/W2306447822","https://openalex.org/W2332483940","https://openalex.org/W2340163519","https://openalex.org/W2469072062","https://openalex.org/W2546701850","https://openalex.org/W2549308600","https://openalex.org/W2557738313","https://openalex.org/W2619568410","https://openalex.org/W2626764419","https://openalex.org/W2759033737","https://openalex.org/W2760115789","https://openalex.org/W2987687226","https://openalex.org/W3100536493"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W2153696906","https://openalex.org/W2944823289","https://openalex.org/W38533693","https://openalex.org/W3037018281","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W1760333999"],"abstract_inverted_index":{"The":[0,70,143,178],"security":[1,24],"of":[2,17,113],"sensitive":[3],"information":[4,38],"is":[5,117,136,146,181],"an":[6,125],"urgent":[7],"need":[8],"in":[9,13,39,48,73,185],"today's":[10],"communication,":[11],"principally":[12],"cloud":[14,41,82],"and":[15,61,83,106,155,187],"Internet":[16],"Things":[18],"(IoT)":[19],"environments.":[20],"Therefore,":[21],"a":[22,33,97,172],"well-designed":[23],"mechanism":[25],"should":[26],"be":[27],"carefully":[28],"considered.":[29],"This":[30,93],"paper":[31,94],"presents":[32,96],"new":[34],"framework":[35],"for":[36,183],"secure":[37,147],"fog":[40,68,81,186],"IoT.":[42],"In":[43,129,158],"the":[44,46,56,63,67,77,80,85,89,111,130,133,167],"framework,":[45],"user":[47],"one":[49,169],"location":[50,75],"embeds":[51],"his/her":[52],"valuable":[53],"data":[54,65,78],"via":[55,88],"proposed":[57,90,168,179],"quantum":[58,99,107,120],"steganography":[59,100,121],"protocol":[60,101,122,145],"uploads":[62],"covered":[64],"to":[66,138,170],"cloud.":[69],"intended":[71,86],"receiver":[72],"another":[74],"accesses":[76],"from":[79],"extracts":[84],"content":[87],"extraction":[91],"approach.":[92],"also":[95],"novel":[98],"based":[102],"on":[103],"hash":[104,134],"function":[105,135],"entangled":[108],"states.":[109],"To":[110],"best":[112],"our":[114],"knowledge,":[115],"there":[116],"no":[118],"prior":[119],"that":[123],"authenticates":[124],"embedded":[126,140],"secret":[127,141,173],"message.":[128],"suggested":[131],"protocol,":[132],"utilized":[137],"authenticate":[139],"messages.":[142],"presented":[144],"against":[148],"well-known":[149],"attacks,":[150],"such":[151],"as":[152],"message,":[153],"man-in-the-middle,":[154],"no-message":[156],"attacks.":[157],"addition,":[159],"it":[160],"does":[161],"not":[162],"consume":[163],"additional":[164],"channels":[165],"besides":[166],"send":[171],"message":[174],"or":[175],"verify":[176],"security.":[177],"approach":[180],"nominated":[182],"use":[184],"mobile":[188],"edge":[189],"computing.":[190]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":23},{"year":2021,"cited_by_count":30},{"year":2020,"cited_by_count":31},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
