{"id":"https://openalex.org/W3042649851","doi":"https://doi.org/10.1109/comm48946.2020.9141971","title":"Implementing Cloud Qualified Electronic Signatures for Documents using Available Cryptographic Libraries: A Survey","display_name":"Implementing Cloud Qualified Electronic Signatures for Documents using Available Cryptographic Libraries: A Survey","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3042649851","doi":"https://doi.org/10.1109/comm48946.2020.9141971","mag":"3042649851"},"language":"en","primary_location":{"id":"doi:10.1109/comm48946.2020.9141971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comm48946.2020.9141971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 13th International Conference on Communications (COMM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051262331","display_name":"Elena-Cristina Ruica","orcid":null},"institutions":[{"id":"https://openalex.org/I2802885015","display_name":"Military Technical Academy","ror":"https://ror.org/01tqmsq19","country_code":"RO","type":"education","lineage":["https://openalex.org/I2802885015"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Elena-Cristina Ruica","raw_affiliation_strings":["Department of Computers and Cybersecurity, Military Technical Academy, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Department of Computers and Cybersecurity, Military Technical Academy, Bucharest, Romania","institution_ids":["https://openalex.org/I2802885015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015291438","display_name":"Mihai-Lic\u0103 Pura","orcid":null},"institutions":[{"id":"https://openalex.org/I2802885015","display_name":"Military Technical Academy","ror":"https://ror.org/01tqmsq19","country_code":"RO","type":"education","lineage":["https://openalex.org/I2802885015"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Mihai-Lica Pura","raw_affiliation_strings":["Department of Computers and Cybersecurity, Military Technical Academy, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Department of Computers and Cybersecurity, Military Technical Academy, Bucharest, Romania","institution_ids":["https://openalex.org/I2802885015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021844792","display_name":"Iulian Aciob\u0103nitei","orcid":null},"institutions":[{"id":"https://openalex.org/I2802885015","display_name":"Military Technical Academy","ror":"https://ror.org/01tqmsq19","country_code":"RO","type":"education","lineage":["https://openalex.org/I2802885015"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Iulian Aciobanitei","raw_affiliation_strings":["Cyber Security Advanced Technologies Center of Excellence, Military Technical Academy, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Cyber Security Advanced Technologies Center of Excellence, Military Technical Academy, Bucharest, Romania","institution_ids":["https://openalex.org/I2802885015"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051262331"],"corresponding_institution_ids":["https://openalex.org/I2802885015"],"apc_list":null,"apc_paid":null,"fwci":0.1359,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.55046908,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"7","issue":null,"first_page":"113","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.796668291091919},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.7151442766189575},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7070168852806091},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6684183478355408},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6470754742622375},{"id":"https://openalex.org/keywords/globe","display_name":"Globe","score":0.5916718244552612},{"id":"https://openalex.org/keywords/electronic-signature","display_name":"Electronic signature","score":0.5271415710449219},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5119019746780396},{"id":"https://openalex.org/keywords/sign","display_name":"Sign (mathematics)","score":0.47821614146232605},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.37977659702301025},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3673613667488098}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.796668291091919},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.7151442766189575},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7070168852806091},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6684183478355408},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6470754742622375},{"id":"https://openalex.org/C2775899829","wikidata":"https://www.wikidata.org/wiki/Q3109007","display_name":"Globe","level":2,"score":0.5916718244552612},{"id":"https://openalex.org/C196587545","wikidata":"https://www.wikidata.org/wiki/Q869548","display_name":"Electronic signature","level":3,"score":0.5271415710449219},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5119019746780396},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.47821614146232605},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.37977659702301025},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3673613667488098},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C118487528","wikidata":"https://www.wikidata.org/wiki/Q161437","display_name":"Ophthalmology","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comm48946.2020.9141971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comm48946.2020.9141971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 13th International Conference on Communications (COMM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1553721534","https://openalex.org/W2226947361","https://openalex.org/W2939703448","https://openalex.org/W2945505548","https://openalex.org/W6689193145","https://openalex.org/W6762385037"],"related_works":["https://openalex.org/W2122847154","https://openalex.org/W2364899254","https://openalex.org/W2356798462","https://openalex.org/W2551027377","https://openalex.org/W2356917937","https://openalex.org/W2904818008","https://openalex.org/W57958781","https://openalex.org/W2102051619","https://openalex.org/W1544992847","https://openalex.org/W2342603380"],"abstract_inverted_index":{"According":[0],"to":[1,52,69,106,126],"European":[2],"law":[3],"(that":[4],"also":[5,78],"has":[6],"equivalent":[7],"national":[8],"regulations":[9],"across":[10],"the":[11,17,40,59,67,92,113,121,136],"globe),":[12],"qualified":[13],"electronic":[14,30,35],"signatures":[15,90,130],"have":[16,91],"same":[18],"legal":[19],"value":[20],"as":[21,80,98],"handwritten":[22],"ones,":[23],"so":[24],"paper":[25,82,116],"documents":[26,57],"are":[27,38,77,104],"replaced":[28],"by":[29,112],"versions.":[31],"As":[32],"a":[33,71,118],"consequence,":[34],"document":[36],"flows":[37],"reshaping":[39],"way":[41],"people":[42],"interact":[43],"with":[44],"governments,":[45],"banks":[46],"and":[47,110,139,144,146],"other":[48],"companies,":[49],"enabling":[50],"them":[51],"sign":[53],"any":[54],"kind":[55],"of":[56,61,94,120],"from":[58],"comfort":[60],"their":[62],"office":[63],"or":[64],"home,":[65],"without":[66],"need":[68],"visit":[70],"physical":[72,81],"branch.":[73],"The":[74],"overall":[75],"costs":[76],"reduced,":[79],"management":[83],"is":[84],"no":[85,99],"longer":[86],"needed.":[87],"Remote":[88],"digital":[89,129],"potential":[93],"adding":[95],"extra":[96],"convenience,":[97],"more":[100],"special":[101],"cryptographic":[102,142,148],"devices":[103],"needed":[105],"be":[107],"own,":[108],"managed,":[109],"use":[111,125],"signers.":[114],"This":[115],"presents":[117],"survey":[119],"methods":[122],"one":[123],"can":[124],"integrate":[127],"remote":[128],"into":[131],"existing":[132],"signing":[133],"applications":[134],"using":[135],"most":[137],"popular":[138],"widely":[140],"used":[141],"APIs":[143],"low-level":[145],"high-level":[147],"SDKs.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
