{"id":"https://openalex.org/W4226470290","doi":"https://doi.org/10.1145/3508072.3508099","title":"The Impact of Quantum Computing on Security in Emerging Technologies","display_name":"The Impact of Quantum Computing on Security in Emerging Technologies","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4226470290","doi":"https://doi.org/10.1145/3508072.3508099"},"language":"en","primary_location":{"id":"doi:10.1145/3508072.3508099","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508072.3508099","pdf_url":null,"source":{"id":"https://openalex.org/S4363608372","display_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064962134","display_name":"Abdelrahman Abuarqoub","orcid":"https://orcid.org/0000-0001-6576-8932"},"institutions":[{"id":"https://openalex.org/I8408910","display_name":"Cardiff Metropolitan University","ror":"https://ror.org/00bqvf857","country_code":"GB","type":"education","lineage":["https://openalex.org/I8408910"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Abdelrahman Abuarqoub","raw_affiliation_strings":["Cardiff School of Technologies, Cardiff Metropolitan University, UK"],"affiliations":[{"raw_affiliation_string":"Cardiff School of Technologies, Cardiff Metropolitan University, UK","institution_ids":["https://openalex.org/I8408910"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004439311","display_name":"Simak Abuarqoub","orcid":null},"institutions":[{"id":"https://openalex.org/I63098007","display_name":"Liverpool John Moores University","ror":"https://ror.org/04zfme737","country_code":"GB","type":"education","lineage":["https://openalex.org/I63098007"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Simak Abuarqoub","raw_affiliation_strings":["Faculty of Engineering and Technology, Liverpool John Moores University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Technology, Liverpool John Moores University, United Kingdom","institution_ids":["https://openalex.org/I63098007"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005151465","display_name":"Ahmad Alzu\u2019bi","orcid":"https://orcid.org/0000-0001-5466-0379"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ahmad Alzu'bi","raw_affiliation_strings":["Department of Computer Science, Jordan University of Science and Technology, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Jordan University of Science and Technology, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024357714","display_name":"Ammar Muthanna","orcid":"https://orcid.org/0000-0003-0213-8145"},"institutions":[{"id":"https://openalex.org/I37355250","display_name":"Saint-Petersburg State University of Telecommunications","ror":"https://ror.org/00pcyc255","country_code":"RU","type":"education","lineage":["https://openalex.org/I37355250"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Ammar Muthanna","raw_affiliation_strings":["Department of Telecommunication Networks and Data Transmission, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Russian Federation"],"affiliations":[{"raw_affiliation_string":"Department of Telecommunication Networks and Data Transmission, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Russian Federation","institution_ids":["https://openalex.org/I37355250"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064962134"],"corresponding_institution_ids":["https://openalex.org/I8408910"],"apc_list":null,"apc_paid":null,"fwci":0.8883,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.78791239,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"171","last_page":"176"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12002","display_name":"Computability, Logic, AI Algorithms","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.8243227005004883},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7057870030403137},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.6520073413848877},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5613599419593811},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.47563982009887695},{"id":"https://openalex.org/keywords/quantum-technology","display_name":"Quantum technology","score":0.45728322863578796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42722728848457336},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34566307067871094},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.32239869236946106},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.2679622769355774},{"id":"https://openalex.org/keywords/open-quantum-system","display_name":"Open quantum system","score":0.15308108925819397},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08348125219345093}],"concepts":[{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.8243227005004883},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7057870030403137},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.6520073413848877},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5613599419593811},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.47563982009887695},{"id":"https://openalex.org/C190463098","wikidata":"https://www.wikidata.org/wiki/Q2081419","display_name":"Quantum technology","level":4,"score":0.45728322863578796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42722728848457336},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34566307067871094},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.32239869236946106},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.2679622769355774},{"id":"https://openalex.org/C190474826","wikidata":"https://www.wikidata.org/wiki/Q2495111","display_name":"Open quantum system","level":3,"score":0.15308108925819397},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08348125219345093},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3508072.3508099","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508072.3508099","pdf_url":null,"source":{"id":"https://openalex.org/S4363608372","display_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 5th International Conference on Future Networks &amp; Distributed Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W115629558","https://openalex.org/W203951071","https://openalex.org/W1513904472","https://openalex.org/W1552510908","https://openalex.org/W1566345534","https://openalex.org/W1598238634","https://openalex.org/W1612021761","https://openalex.org/W1882598960","https://openalex.org/W2084652510","https://openalex.org/W2168676717","https://openalex.org/W2172273481","https://openalex.org/W2488165047","https://openalex.org/W2559394418","https://openalex.org/W2611056906","https://openalex.org/W2731865152","https://openalex.org/W2766522683","https://openalex.org/W2778213072","https://openalex.org/W2794326922","https://openalex.org/W2885665137","https://openalex.org/W2895182117","https://openalex.org/W2919623724","https://openalex.org/W2950917269","https://openalex.org/W2962170189","https://openalex.org/W2986959318","https://openalex.org/W2987845144","https://openalex.org/W3010136320","https://openalex.org/W3014223651","https://openalex.org/W3023867911","https://openalex.org/W3119636101","https://openalex.org/W3172550433","https://openalex.org/W3195369086","https://openalex.org/W3212155382","https://openalex.org/W6600689906","https://openalex.org/W6633254687","https://openalex.org/W6633819675"],"related_works":["https://openalex.org/W2029021368","https://openalex.org/W4232705780","https://openalex.org/W2965484163","https://openalex.org/W2512006651","https://openalex.org/W2096221836","https://openalex.org/W3173339789","https://openalex.org/W4385627932","https://openalex.org/W4288754535","https://openalex.org/W2548040793","https://openalex.org/W3008265109"],"abstract_inverted_index":{"Quantum":[0,44],"computing":[1,45,65,134],"is":[2,25,78,167],"rapidly":[3],"shifting":[4],"from":[5],"high-tech":[6],"lab":[7],"to":[8,31,86,139,178],"mainstream":[9],"commercial":[10],"use":[11],"in":[12,21,182],"the":[13,18,71,88,109,130,140,152,172,183],"next":[14,19],"few":[15],"years,":[16],"representing":[17],"breakthrough":[20],"modern":[22],"ICT.":[23],"It":[24,77],"motivated":[26],"by":[27],"quantum":[28,64,81,133,153,162,184],"computer's":[29],"ability":[30],"perform":[32],"computational":[33],"tasks":[34],"with":[35,41],"efficiencies":[36],"that":[37,80],"are":[38,156,186],"not":[39],"possible":[40,159],"classical":[42],"computers.":[43],"technology":[46,154],"has":[47,66],"a":[48],"lasting":[49],"potential":[50],"impact":[51,160],"on":[52,57,101,123,164],"society":[53],"and":[54,92,97,119,143],"broad":[55],"implications":[56],"many":[58],"aspects":[59],"of":[60,73,111,132,146,161,171],"our":[61],"lives.":[62],"Although":[63],"several":[67],"advantages,":[68],"it":[69],"threatens":[70],"security":[72],"current":[74,141],"cryptographic":[75],"techniques.":[76],"expected":[79],"computers":[82],"will":[83,135],"be":[84],"able":[85],"solve":[87],"key":[89],"distribution":[90],"problem":[91],"break":[93],"every":[94],"single":[95],"cryptography":[96,124],"authentication":[98],"algorithm":[99],"based":[100],"asymmetric":[102],"cryptography.":[103],"New":[104],"emerging":[105,165],"technologies":[106,163,166],"such":[107],"as":[108],"Internet":[110],"Things,":[112],"blockchain,":[113],"autonomous":[114],"vehicles,":[115],"5G,":[116],"artificial":[117],"intelligence":[118],"robotics":[120],"all":[121],"rely":[122],"for":[125],"their":[126],"secure":[127],"operation.":[128],"Therefore,":[129],"realisation":[131],"pose":[136],"significant":[137],"challenges":[138],"progress":[142],"future":[144],"development":[145],"these":[147],"technologies.":[148],"In":[149],"this":[150],"paper,":[151],"preliminaries":[155],"discussed.":[157,187],"The":[158],"investigated.":[168],"Finally,":[169],"some":[170],"currently":[173],"available":[174],"quantum-safe":[175],"cryptosystems":[176],"devoted":[177],"protecting":[179],"computer":[180],"systems":[181],"era":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
