{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:02:23Z","timestamp":1747368143694,"version":"3.40.5"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_3","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:12Z","timestamp":1747289592000},"page":"34-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Future-Proof Asynchronous IoT Backups: An Evaluation of\u00a0Secure IoT Data Recovery Considering Post-Quantum Threats"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6488-6840","authenticated-orcid":false,"given":"Dmytro","family":"Shvets","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1536-9233","authenticated-orcid":false,"given":"Edona","family":"Fasllija","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7351-8117","authenticated-orcid":false,"given":"Jakob","family":"Heher","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7076-7563","authenticated-orcid":false,"given":"Stefan","family":"More","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"FIPS 203 module-lattice-based key-encapsulation mechanism standard (ML-KEM). NIST, Gaithersburg, MD (2024). https:\/\/doi.org\/10.6028\/NIST.FIPS.203","DOI":"10.6028\/NIST.FIPS.203"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Chase, M.: FAME: fast attribute-based message encryption. In: CCS 2017. ACM (2017). https:\/\/doi.org\/10.1145\/3133956.3134014","DOI":"10.1145\/3133956.3134014"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Alrawi, O., et\u00a0al.: SoK: security evaluation of home-based IoT deployments. In: S &P 2019. https:\/\/doi.org\/10.1109\/SP.2019.00013","DOI":"10.1109\/SP.2019.00013"},{"key":"3_CR4","unstructured":"Aranha, D.F., Gouv\u00eaa, C.P.L., Markmann, T., Wahby, R.S., Liao, K.: RELIC is an efficient library for cryptography. https:\/\/github.com\/relic-toolkit\/relic"},{"key":"3_CR5","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (2006). https:\/\/doi.org\/10.1145\/1127345.1127346","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"3_CR6","unstructured":"Badawi, A.A., Alexandru, A., Bates, J., et\u00a0al.: OpenFHE: open-source fully homomorphic encryption library. Cryptology ePrint Archive, Paper 2022\/915 (2022)"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS. Springer (1998). https:\/\/doi.org\/10.1007\/BFB0054122","DOI":"10.1007\/BFB0054122"},{"key":"3_CR8","unstructured":"Bos, J.W., et al.: CRYSTALS - kyber: a cca-secure module-lattice-based KEM. IACR Cryptol. ePrint Arch. (2017). http:\/\/eprint.iacr.org\/2017\/634"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (2014). https:\/\/doi.org\/10.1145\/2633600","DOI":"10.1145\/2633600"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Cerdeira, D., Santos, N., Fonseca, P., Pinto, S.: SoK: understanding the prevailing security vulnerabilities in trustzone-assisted TEE systems. In: 2020 IEEE S &P. IEEE (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00061","DOI":"10.1109\/SP40000.2020.00061"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Fitzek, A., Achleitner, F., Winter, J., Hein, D.M.: The ANDIX research OS - ARM trustzone meets industrial control systems security. In: INDIN 2015. https:\/\/doi.org\/10.1109\/INDIN.2015.7281715","DOI":"10.1109\/INDIN.2015.7281715"},{"key":"3_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2020.101874","volume":"96","author":"J Guerreiro","year":"2020","unstructured":"Guerreiro, J., Moura, R., Silva, J.N.: Teender: SGX enclave migration using hsms. Comput. Secur. 96, 101874 (2020). https:\/\/doi.org\/10.1016\/J.COSE.2020.101874","journal-title":"Comput. Secur."},{"key":"3_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2874479","author":"KD G\u00fcr","year":"2019","unstructured":"G\u00fcr, K.D., Polyakov, Y., Rohloff, K., Ryan, G.W., Sajjadpour, H., Savas, E.: Practical applications of improved gaussian sampling for trapdoor lattices. IEEE Trans. Comput. (2019). https:\/\/doi.org\/10.1109\/TC.2018.2874479","journal-title":"IEEE Trans. Comput."},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"H\u00f6randner, F., Nieddu, F.: Cloud data sharing and device-loss recovery with hardware-bound keys. In: ICISS. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-36945-3_11","DOI":"10.1007\/978-3-030-36945-3_11"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Jiang, B., et\u00a0al.: Security and reliability of internet of underwater things: architecture, challenges, and opportunities. ACM Comput. Surv. 57(3) (2024). https:\/\/doi.org\/10.1145\/3700640","DOI":"10.1145\/3700640"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Laurie, B., Langley, A., K\u00e4sper, E.: Certificate transparency. RFC (2013). https:\/\/doi.org\/10.17487\/RFC6962","DOI":"10.17487\/RFC6962"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Li, J.: Attribute based signature encryption scheme based on cloud computing in medical social networks. J. Cyber Secur. Mobil. (2024). https:\/\/doi.org\/10.13052\/JCSM2245-1439.1338","DOI":"10.13052\/JCSM2245-1439.1338"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Loupos, K., et\u00a0al.: An inclusive lifecycle approach for iot devices trust and identity management. In: ARES 2023. https:\/\/doi.org\/10.1145\/3600160.3605083","DOI":"10.1145\/3600160.3605083"},{"key":"3_CR19","unstructured":"Marc, T., et\u00a0al.: CiFEr (2021). https:\/\/github.com\/fentec-project\/CiFEr"},{"key":"3_CR20","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8547.ipd","author":"D Moody","year":"2024","unstructured":"Moody, D., Perlner, R., Regenscheid, A., Robinson, A., Cooper, D.: Transition to post-quantum cryptography standards (initial public draft) (2024). https:\/\/doi.org\/10.6028\/NIST.IR.8547.ipd","journal-title":"Transition to post-quantum cryptography standards (initial public draft)"},{"key":"3_CR21","doi-asserted-by":"publisher","DOI":"10.2197\/IPSJJIP.28.292","author":"H Nishimura","year":"2020","unstructured":"Nishimura, H., Omori, Y., Yamashita, T.: Secure authentication key sharing between personal mobile devices based on owner identity. J. Inf. Process. (2020). https:\/\/doi.org\/10.2197\/IPSJJIP.28.292","journal-title":"J. Inf. Process."},{"key":"3_CR22","unstructured":"Oakes, E., Burkhalter, L.: AFGH Proxy re-encryption with RELIC (2019). https:\/\/github.com\/lubux\/afgh-pre-relic"},{"key":"3_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2993323","author":"C Paniagua","year":"2021","unstructured":"Paniagua, C., Delsing, J.: Industrial frameworks for internet of things: a survey. IEEE Syst. J. (2021). https:\/\/doi.org\/10.1109\/JSYST.2020.2993323","journal-title":"IEEE Syst. J."},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Regev, O.: An efficient quantum factoring algorithm. CoRR (2023). https:\/\/doi.org\/10.48550\/ARXIV.2308.06572","DOI":"10.48550\/ARXIV.2308.06572"},{"key":"3_CR25","unstructured":"Roy, A.: ml-kem (2024). https:\/\/github.com\/itzmeanjan\/ml-kem"},{"key":"3_CR26","unstructured":"Sahai, A., Waters, B.: Fuzzy identity based encryption. IACR Cryptol. ePrint Arch. (2004). http:\/\/eprint.iacr.org\/2004\/086"},{"key":"3_CR27","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Shepherd, C., Akram, R.N., Markantonakis, K.: Remote credential management with mutual attestation for trusted execution environments. In: Blazy, O., Yeun, C.Y. (eds.) WISTP 2018. https:\/\/doi.org\/10.1007\/978-3-030-20074-9_12","DOI":"10.1007\/978-3-030-20074-9_12"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: IEEE FOCS 1994. https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Tomur, E., et\u00a0al.: SoK: investigation of security and functional safety in industrial iot. In: IEEE CSR (2021). https:\/\/doi.org\/10.1109\/CSR51186.2021.9527921","DOI":"10.1109\/CSR51186.2021.9527921"},{"key":"3_CR31","unstructured":"Triplett, M., Saylor, J., Polyakov, Y., et\u00a0al.: PALISADE abe (2021). https:\/\/gitlab.com\/palisade\/palisade-abe"},{"key":"3_CR32","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9121571","author":"L Zhang","year":"2021","unstructured":"Zhang, L., et al.: A blockchain-based microgrid data disaster backup scheme in edge computing. Secur. Commun. Netw. (2021). https:\/\/doi.org\/10.1155\/2021\/9121571","journal-title":"Secur. Commun. Netw."}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:17Z","timestamp":1747289597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}