{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T07:26:17Z","timestamp":1775633177855,"version":"3.50.1"},"reference-count":281,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s10586-024-04799-4","type":"journal-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T18:57:37Z","timestamp":1732647457000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices"],"prefix":"10.1007","volume":"28","author":[{"given":"Khwaja","family":"Mansoor","sequence":"first","affiliation":[]},{"given":"Mehreen","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Yawar","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,26]]},"reference":[{"issue":"2","key":"4799_CR1","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MCOM.2017.1600522CM","volume":"55","author":"C Cheng","year":"2017","unstructured":"Cheng, C., Lu, R., Petzoldt, A., Takagi, T.: Securing the internet of things in a quantum world. IEEE Commun. Mag. 55(2), 116\u2013120 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"4799_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02673-x","volume":"19","author":"J Suo","year":"2020","unstructured":"Suo, J., Wang, L., Yang, S., Zheng, W., Zhang, J.: Quantum algorithms for typical hard problems: a perspective of cryptanalysis. Quantum Inf. Process. 19(6), 1\u201326 (2020)","journal-title":"Quantum Inf. Process."},{"key":"4799_CR3","doi-asserted-by":"crossref","unstructured":"Chen, L., Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., Smith-Tone, D.: Report on Post-quantum Cryptography, vol. 12. US Department of Commerce, National Institute of Standards and Technology (2016)","DOI":"10.6028\/NIST.IR.8105"},{"key":"4799_CR4","doi-asserted-by":"crossref","unstructured":"Gorbenko, Y., Svatovskiy, I., Shevtsov, O.: Post-quantum message authentication cryptography based on error-correcting codes. In: 2016 3rd International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S &T), pp. 51\u201354. IEEE (2016)","DOI":"10.1109\/INFOCOMMST.2016.7905333"},{"key":"4799_CR5","doi-asserted-by":"crossref","unstructured":"Ding, J., Alsayigh, S., Lancrenon, J., RV, S., Snook, M.: Provably secure password authenticated key exchange based on rlwe for the post-quantum world. In: Cryptographers\u2019 Track at the RSA Conference, pp. 183\u2013204. Springer (2017)","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"4799_CR6","unstructured":"Longa, P.: A note on post-quantum authenticated key exchange from supersingular isogenies. Cryptology ePrint Archive (2018)"},{"key":"4799_CR7","doi-asserted-by":"crossref","unstructured":"Lohachab, A., et\u00a0al.: Using quantum key distribution and ecc for secure inter-device authentication and communication in iot infrastructure. In: Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), pp. 26\u201327 (2018)","DOI":"10.2139\/ssrn.3166511"},{"key":"4799_CR8","doi-asserted-by":"publisher","first-page":"5393","DOI":"10.1109\/ACCESS.2017.2788411","volume":"6","author":"W Yin","year":"2018","unstructured":"Yin, W., Wen, Q., Li, W., Zhang, H., Jin, Z.: An anti-quantum transaction authentication approach in blockchain. IEEE Access 6, 5393\u20135401 (2018)","journal-title":"IEEE Access"},{"key":"4799_CR9","doi-asserted-by":"crossref","unstructured":"Fujioka, A., Takashima, K., Terada, S., Yoneyama, K.: Supersingular isogeny diffie\u2013hellman authenticated key exchange. In: International Conference on Information Security and Cryptology, pp. 177\u2013195. Springer (2018)","DOI":"10.1007\/978-3-030-12146-4_12"},{"key":"4799_CR10","doi-asserted-by":"crossref","unstructured":"Latif, M.K., Jacinto, H.S., Daoud, L., Rafla, N.: Optimization of a quantum-secure sponge-based hash message authentication protocol. In: 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 984\u2013987. IEEE (2018)","DOI":"10.1109\/MWSCAS.2018.8623880"},{"key":"4799_CR11","unstructured":"Crockett, E., Paquin, C., Stebila, D.: Prototyping post-quantum and hybrid key exchange and authentication in tls and ssh. Cryptology ePrint Archive (2019)"},{"issue":"8","key":"4799_CR12","doi-asserted-by":"publisher","first-page":"3337","DOI":"10.1007\/s12652-019-01529-2","volume":"11","author":"Z Li","year":"2020","unstructured":"Li, Z., Wang, J., Zhang, W.: Revisiting post-quantum hash proof systems over lattices for internet of thing authentications. J. Ambient Intell. Hum. Comput. 11(8), 3337\u20133347 (2020)","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"2","key":"4799_CR13","doi-asserted-by":"publisher","first-page":"3810","DOI":"10.1002\/ett.3810","volume":"31","author":"D Dharminder","year":"2020","unstructured":"Dharminder, D., Mishra, D.: Lcppa: lattice-based conditional privacy preserving authentication in vehicular communication. Trans. Emerging Telecommun. Technol. 31(2), 3810 (2020)","journal-title":"Trans. Emerging Telecommun. Technol."},{"key":"4799_CR14","doi-asserted-by":"crossref","unstructured":"Paul, S., Guerin, E.: Hybrid opc ua: Enabling post-quantum security for the industrial internet of things. In: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), vol. 1, pp. 238\u2013245. IEEE (2020)","DOI":"10.1109\/ETFA46521.2020.9212112"},{"issue":"3","key":"4799_CR15","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/cryptography7030040","volume":"7","author":"D-T Dam","year":"2023","unstructured":"Dam, D.-T., Tran, T.-H., Hoang, V.-P., Pham, C.-K., Hoang, T.-T.: A survey of post-quantum cryptography: start of a new race. Cryptography 7(3), 40 (2023)","journal-title":"Cryptography"},{"issue":"5","key":"4799_CR16","doi-asserted-by":"publisher","first-page":"234","DOI":"10.4103\/0256-4602.44659","volume":"25","author":"GP Joshi","year":"2008","unstructured":"Joshi, G.P., Kim, S.W.: Survey, nomenclature and comparison of reader anti-collision protocols in rfid. IETE Tech. Rev. 25(5), 234\u2013243 (2008)","journal-title":"IETE Tech. Rev."},{"key":"4799_CR17","unstructured":"Camarinha-Matos, L.M., Goes, J., Gomes, L., Martins, J.: Contributing to the internet of things. InTechnological Innovation for the Internet of Things: 4th IFIP WG 5.5\/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2013, Costa de Caparica, Portugal, April 15-17, 2013, (pp. 3-12). Springer Berlin Heidelberg (2013)"},{"issue":"5","key":"4799_CR18","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MIC.2007.110","volume":"11","author":"M Hepp","year":"2007","unstructured":"Hepp, M., Siorpaes, K., Bachlechner, D.: Harvesting wiki consensus: using wikipedia entries as vocabulary for knowledge management. IEEE Int. Comput. 11(5), 54\u201365 (2007)","journal-title":"IEEE Int. Comput."},{"issue":"4","key":"4799_CR19","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10799-012-0121-1","volume":"13","author":"Y Li","year":"2012","unstructured":"Li, Y., Hou, M., Liu, H., Liu, Y.: Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of internet of things. Inf. Technol. Manage. 13(4), 205\u2013216 (2012)","journal-title":"Inf. Technol. Manage."},{"issue":"2","key":"4799_CR20","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/17517575.2011.654266","volume":"6","author":"S Li","year":"2012","unstructured":"Li, S., Xu, L., Wang, X., Wang, J.: Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterp. Inf. Syst. 6(2), 165\u201387 (2012)","journal-title":"Enterp. Inf. Syst."},{"issue":"5","key":"4799_CR21","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.cad.2010.03.002","volume":"43","author":"D Kiritsis","year":"2011","unstructured":"Kiritsis, D.: Closed-loop plm for intelligent products in the era of the internet of things. Comput. Aided Des. 43(5), 479\u2013501 (2011)","journal-title":"Comput. Aided Des."},{"issue":"6","key":"4799_CR22","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/0308-5961(90)90020-R","volume":"14","author":"SM Besen","year":"1990","unstructured":"Besen, S.M.: The European telecommunications standards institute: A preliminary analysis. Telecommun. Policy 14(6), 521\u2013530 (1990)","journal-title":"Telecommun. Policy"},{"key":"4799_CR23","unstructured":"Kranenburg, V.: Moscow futurodesign lab co-create urban intelli-gence: designing smart interfaces between people and city (2013)"},{"issue":"3","key":"4799_CR24","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/TII.2012.2188899","volume":"8","author":"J Guo","year":"2012","unstructured":"Guo, J., Da Xu, L., Xiao, G., Gong, Z.: Improving multilingual semantic interoperation in cross-organizational enterprise systems through concept disambiguation. IEEE Trans. Industr. Inf. 8(3), 647\u2013658 (2012)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"4","key":"4799_CR25","doi-asserted-by":"publisher","first-page":"2177","DOI":"10.1109\/TII.2012.2189222","volume":"9","author":"S Li","year":"2012","unstructured":"Li, S., Da Xu, L., Wang, X.: Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans. Industr. Inf. 9(4), 2177\u20132186 (2012)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"4799_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107174","volume":"155","author":"J Wang","year":"2021","unstructured":"Wang, J., Lim, M.K., Wang, C., Tseng, M.-L.: The evolution of the internet of things (iot) over the past 20 years. Comput. Industr. Eng. 155, 107174 (2021)","journal-title":"Comput. Industr. Eng."},{"issue":"2","key":"4799_CR27","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1080\/17517575.2012.745618","volume":"7","author":"MY Kataev","year":"2013","unstructured":"Kataev, M.Y., Bulysheva, L.A., Emelyanenko, A.A., Emelyanenko, V.A.: Enterprise systems in Russia: 1992\u20132012. Enterp. Inf. Syst. 7(2), 169\u2013186 (2013)","journal-title":"Enterp. Inf. Syst."},{"issue":"2","key":"4799_CR28","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1109\/TII.2014.2306384","volume":"10","author":"L Jiang","year":"2014","unstructured":"Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., Xu, B.: An iot-oriented data storage framework in cloud computing platform. IEEE Trans. Industr. Inf. 10(2), 1443\u20131451 (2014)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"2","key":"4799_CR29","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.bushor.2012.11.010","volume":"56","author":"L Li","year":"2013","unstructured":"Li, L.: Technology designed to combat fakes in the global supply chain. Bus. Horiz. 56(2), 167\u2013177 (2013)","journal-title":"Bus. Horiz."},{"issue":"3","key":"4799_CR30","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1080\/17517575.2011.592598","volume":"6","author":"L Ren","year":"2012","unstructured":"Ren, L., Zhang, L., Tao, F., Zhang, X., Luo, Y., Zhang, Y.: A methodology towards virtualisation-based high performance simulation platform supporting multidisciplinary design of complex products. Enterp. Inf. Syst. 6(3), 267\u2013290 (2012)","journal-title":"Enterp. Inf. Syst."},{"issue":"2","key":"4799_CR31","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/TII.2014.2306397","volume":"10","author":"F Tao","year":"2014","unstructured":"Tao, F., Zuo, Y., Da Xu, L., Zhang, L.: Iot-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Trans. Industr. Inf. 10(2), 1547\u20131557 (2014)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"4799_CR32","doi-asserted-by":"crossref","unstructured":"Wang, C., Bi, Z., Da, Xu., L.: Iot and cloud computing in automation of assembly modeling systems. IEEE Trans. Industr. Inf. 10(2), 1426\u20131434 (2014)","DOI":"10.1109\/TII.2014.2300346"},{"issue":"4","key":"4799_CR33","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2016","unstructured":"Mosenia, A., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586\u2013602 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"1","key":"4799_CR34","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/JIOT.2017.2779180","volume":"5","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Kuang, Y., Xiao, Y., Xu, G.: Sdn-based data transfer security for internet of things. IEEE Internet Things J. 5(1), 257\u2013268 (2017)","journal-title":"IEEE Internet Things J."},{"key":"4799_CR35","doi-asserted-by":"crossref","unstructured":"Conti, M., Kaliyar, P., Lal, C.: Censor: Cloud-enabled secure iot architecture over sdn paradigm. Concurr. Comput.: Pract. Exp. 31(8), 4978 (2019)","DOI":"10.1002\/cpe.4978"},{"key":"4799_CR36","doi-asserted-by":"crossref","unstructured":"Khan, F.I., Hameed, S.: Understanding security requirements and challenges in internet of things (iots): a review. arXiv preprint arXiv:1808.10529 (2018)","DOI":"10.1155\/2019\/9629381"},{"key":"4799_CR37","doi-asserted-by":"publisher","first-page":"5591","DOI":"10.1109\/ACCESS.2016.2607786","volume":"4","author":"N Bizanis","year":"2016","unstructured":"Bizanis, N., Kuipers, F.A.: Sdn and virtualization solutions for the internet of things: a survey. IEEE Access 4, 5591\u20135606 (2016)","journal-title":"IEEE Access"},{"issue":"10","key":"4799_CR38","doi-asserted-by":"publisher","first-page":"10250","DOI":"10.1109\/JIOT.2020.2997651","volume":"7","author":"W Iqbal","year":"2020","unstructured":"Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., Bangash, Y.A.: An in-depth analysis of iot security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J. 7(10), 10250\u201310276 (2020)","journal-title":"IEEE Internet Things J."},{"key":"4799_CR39","doi-asserted-by":"crossref","unstructured":"Nguyen, T.N.: The challenges in sdn\/ml based network security: a survey. arXiv preprint arXiv:1804.03539 (2018)","DOI":"10.1109\/CSNET.2018.8602680"},{"key":"4799_CR40","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.comnet.2018.07.020","volume":"143","author":"O Salman","year":"2018","unstructured":"Salman, O., Elhajj, I., Chehab, A., Kayssi, A.: Iot survey: an sdn and fog computing perspective. Comput. Netw. 143, 221\u2013246 (2018)","journal-title":"Comput. Netw."},{"issue":"2","key":"4799_CR41","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1109\/COMST.2018.2874978","volume":"21","author":"I Makhdoom","year":"2018","unstructured":"Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the internet of things. IEEE Commun. Surv. Tutor. 21(2), 1636\u20131675 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4799_CR42","unstructured":"Banafa, A.: Iot standardization and implementation challenges. IEEE Internet Things Newslett. 1\u201310 (2016)"},{"issue":"4","key":"4799_CR43","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1109\/COMST.2017.2736886","volume":"19","author":"A Gharaibeh","year":"2017","unstructured":"Gharaibeh, A., Salahuddin, M.A., Hussini, S.J., Khreishah, A., Khalil, I., Guizani, M., Al-Fuqaha, A.: Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun. Surv. Tutor. 19(4), 2456\u20132501 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"4799_CR44","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/COMST.2017.2748998","volume":"20","author":"D Eckhoff","year":"2017","unstructured":"Eckhoff, D., Wagner, I.: Privacy in the smart city-applications, technologies, challenges, and solutions. IEEE Commun. Surv. Tutor. 20(1), 489\u2013516 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"11","key":"4799_CR45","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.3390\/s20113113","volume":"20","author":"SL Ullo","year":"2020","unstructured":"Ullo, S.L., Sinha, G.R.: Advances in smart environment monitoring systems using iot and sensors. Sensors 20(11), 3113 (2020)","journal-title":"Sensors"},{"issue":"2","key":"4799_CR46","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TIFS.2018.2854703","volume":"14","author":"X Xia","year":"2018","unstructured":"Xia, X., Xiao, Y., Liang, W.: Absi: an adaptive binary splitting algorithm for malicious meter inspection in smart grid. IEEE Trans. Inf. Forens. Secur. 14(2), 445\u2013458 (2018)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"4799_CR47","doi-asserted-by":"crossref","unstructured":"Dlamini, N.N., Johnston, K.: The use, benefits and challenges of using the Internet of Things (IoT) in retail businesses: A literature review. In: 2016 international conference on advances in computing and communication engineering (ICACCE), (pp. 430-436). IEEE (2016)","DOI":"10.1109\/ICACCE.2016.8073787"},{"key":"4799_CR48","doi-asserted-by":"crossref","unstructured":"Ji, Z., Anwen, Q.: The application of internet of things (iot) in emergency management system in china. In: 2010 IEEE International Conference on Technologies for Homeland Security (HST), pp. 139\u2013142. IEEE (2010)","DOI":"10.1109\/THS.2010.5655073"},{"key":"4799_CR49","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.comnet.2019.03.015","volume":"155","author":"N Al-Nabhan","year":"2019","unstructured":"Al-Nabhan, N., Al-Aboody, N., Al Islam, A.A.: A hybrid iot-based approach for emergency evacuation. Comput. Netw. 155, 87\u201397 (2019)","journal-title":"Comput. Netw."},{"issue":"2","key":"4799_CR50","doi-asserted-by":"publisher","first-page":"75","DOI":"10.18034\/abr.v11i2.579","volume":"11","author":"MS Hossain","year":"2021","unstructured":"Hossain, M.S., Chisty, N.M.A., Hargrove, D.L., Amin, R.: Role of internet of things (iot) in retail business and enabling smart retailing experiences. Asian Bus. Rev. 11(2), 75\u201380 (2021)","journal-title":"Asian Bus. Rev."},{"issue":"2","key":"4799_CR51","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/JSYST.2013.2260700","volume":"8","author":"V Namboodiri","year":"2013","unstructured":"Namboodiri, V., Aravinthan, V., Mohapatra, S.N., Karimi, B., Jewell, W.: Toward a secure wireless-based home area network for metering in smart grids. IEEE Syst. J. 8(2), 509\u2013520 (2013)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"4799_CR52","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"13","key":"4799_CR53","doi-asserted-by":"publisher","first-page":"4269","DOI":"10.1109\/JSEN.2017.2705045","volume":"17","author":"AC Jose","year":"2017","unstructured":"Jose, A.C., Malekian, R.: Improving smart home security: integrating logical sensing into smart home. IEEE Sens. J. 17(13), 4269\u20134286 (2017)","journal-title":"IEEE Sens. J."},{"issue":"3","key":"4799_CR54","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294\u20131312 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4799_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1440-0","volume":"43","author":"M Yaseen","year":"2019","unstructured":"Yaseen, M., Iqbal, W., Rashid, I., Abbas, H., Mohsin, M., Saleem, K., Bangash, Y.A.: Marc: a novel framework for detecting mitm attacks in ehealthcare ble systems. J. Med. Syst. 43, 1\u201318 (2019)","journal-title":"J. Med. Syst."},{"issue":"4","key":"4799_CR56","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4799_CR57","unstructured":"Khari, M., Kumar, M., Vij, S., Pandey, P., et\u00a0al.: Internet of things: Proposed security aspects for digitizing the world. In: 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2165\u20132170. IEEE (2016)"},{"key":"4799_CR58","doi-asserted-by":"crossref","unstructured":"Uckelmann, D., Harrison, M., Michahelles, F.: An architectural approach towards the future internet of things. In: Architecting the Internet of Things, pp. 1\u201324. Springer (2011)","DOI":"10.1007\/978-3-642-19157-2_1"},{"key":"4799_CR59","doi-asserted-by":"crossref","unstructured":"Reziouk, A., Laurent, E., Demay, J.-C.: Practical security overview of ieee 802.15. 4. In: 2016 International Conference on Engineering & MIS (ICEMIS), pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/ICEMIS.2016.7745382"},{"key":"4799_CR60","doi-asserted-by":"crossref","unstructured":"Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C.: Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the internet-of-things. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks, pp. 1\u20137 (2015)","DOI":"10.1145\/2834050.2834095"},{"key":"4799_CR61","unstructured":"AT &TCybersecurityInsights: the ceos guide to data security protect your data through innovation [online] (2016). https:\/\/www.business.att.com\/cybersecurity\/docs\/vol5-datasecurity.pdf"},{"key":"4799_CR62","unstructured":"Ahlmeyer, M., Chircu, A.M.: Securing the internet of things: A review. Issues Inf. Syst. 17(4) (2016)"},{"issue":"5","key":"4799_CR63","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250\u20131258 (2017)","journal-title":"IEEE Internet Things J."},{"key":"4799_CR64","doi-asserted-by":"crossref","unstructured":"Thilakarathne, N.N.: Security and privacy issues in iot environment. Int. J. Eng. Manag. Res. 10 (2020)","DOI":"10.31033\/ijemr.10.1.5"},{"key":"4799_CR65","doi-asserted-by":"crossref","unstructured":"Sehrawat, D., Gill, N.S.: Smart sensors: analysis of different types of iot sensors. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 523\u2013528. IEEE (2019)","DOI":"10.1109\/ICOEI.2019.8862778"},{"key":"4799_CR66","doi-asserted-by":"crossref","unstructured":"Kumar, S.A., Vealey, T., Srivastava, H.: Security in internet of things: challenges, solutions and future directions. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5772\u20135781. IEEE (2016)","DOI":"10.1109\/HICSS.2016.714"},{"key":"4799_CR67","doi-asserted-by":"crossref","unstructured":"Balamurugan, B., Biswas, D.: Security in network layer of iot: possible measures to preclude. In: Security Breaches and Threat Prevention in the Internet of Things, pp. 46\u201375. IGI Global (2017)","DOI":"10.4018\/978-1-5225-2296-6.ch003"},{"key":"4799_CR68","unstructured":"Fox-Brewster, T.: It\u2019s depressingly easy to spy on vulnerable baby monitors using just a browser (2015)"},{"key":"4799_CR69","unstructured":"Fowler, B.: Some top baby monitors lack basic security features, report finds. NBC New York (2015). https:\/\/www.nbcnewyork.com\/news\/local\/baby-monitor-security"},{"issue":"4","key":"4799_CR70","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2013.74","volume":"46","author":"H Ning","year":"2013","unstructured":"Ning, H., Liu, H., Yang, L.T.: Cyberentity security in the internet of things. Computer 46(4), 46\u201353 (2013)","journal-title":"Computer"},{"key":"4799_CR71","doi-asserted-by":"crossref","unstructured":"Wurm, J., Hoang, K., Arias, O., Sadeghi, A.-R., Jin, Y.: Security analysis on consumer and industrial iot devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 519\u2013524. IEEE (2016)","DOI":"10.1109\/ASPDAC.2016.7428064"},{"issue":"2","key":"4799_CR72","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TMSCS.2015.2498605","volume":"1","author":"O Arias","year":"2015","unstructured":"Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99\u2013109 (2015)","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."},{"issue":"3","key":"4799_CR73","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCC.2016.63","volume":"3","author":"D Puthal","year":"2016","unstructured":"Puthal, D., Nepal, S., Ranjan, R., Chen, J.: Threats to networking cloud and edge datacenters in the internet of things. IEEE Cloud Comput. 3(3), 64\u201371 (2016)","journal-title":"IEEE Cloud Comput."},{"key":"4799_CR74","doi-asserted-by":"crossref","unstructured":"Yile, F.: Research on the security problem in windows 7 operating system. In: 2016 8th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), pp. 568\u2013571. IEEE (2016)","DOI":"10.1109\/ICMTMA.2016.139"},{"key":"4799_CR75","unstructured":"Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of internet of things (2015). arXiv preprint arXiv:1501.02211"},{"key":"4799_CR76","doi-asserted-by":"crossref","unstructured":"Savola, R.M., Abie, H., Sihvonen, M.: Towards metrics-driven adaptive security management in e-health iot applications. In: BodyNets, pp. 276\u2013281 (2012)","DOI":"10.4108\/icst.bodynets.2012.250241"},{"key":"4799_CR77","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2015)","DOI":"10.1145\/2744769.2747942"},{"key":"4799_CR78","unstructured":"Nilsson, D.: \u00c5berg H. HTML5 Web application security with OWASP (2013)"},{"issue":"1","key":"4799_CR79","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/s13198-015-0376-0","volume":"8","author":"S Gupta","year":"2017","unstructured":"Gupta, S., Gupta, B.B.: Cross-site scripting (xss) attacks and defense mechanisms: classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manag. 8(1), 512\u2013530 (2017)","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"4799_CR80","unstructured":"Misic, V.B., Fang, J., Misic, J.: Mac layer security of 802.15. 4-compliant networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, p. 8. IEEE (2005)"},{"key":"4799_CR81","doi-asserted-by":"crossref","unstructured":"Deogirikar, J., Vidhate, A.: Security attacks in iot: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 32\u201337. IEEE (2017)","DOI":"10.1109\/I-SMAC.2017.8058363"},{"issue":"7","key":"4799_CR82","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: Ddos in the iot: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"issue":"1","key":"4799_CR83","first-page":"39","volume":"3","author":"VP Reddy","year":"2011","unstructured":"Reddy, V.P., Radha, V., Jindal, M.: Client side protection from phishing attack. Int. J. Adv. Eng. Sci. Technol. 3(1), 39\u201345 (2011)","journal-title":"Int. J. Adv. Eng. Sci. Technol."},{"key":"4799_CR84","unstructured":"Li, C., Chen, C.: A multi-stage control method application in the fight against phishing attacks. In: Proceeding of the 26th Computer Security Academic Communication Across the Country, vol. 145 (2011)"},{"key":"4799_CR85","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s11277-017-4434-6","volume":"95","author":"S Tweneboah-Koduah","year":"2017","unstructured":"Tweneboah-Koduah, S., Skouby, K.E., Tadayoni, R.: Cyber security threats to iot applications and service domains. Wirel. Pers. Commun. 95, 169\u2013185 (2017)","journal-title":"Wirel. Pers. Commun."},{"key":"4799_CR86","doi-asserted-by":"crossref","unstructured":"Swamy, S.N., Jadhav, D., Kulkarni, N.: Security threats in the application layer in iot applications. In: 2017 International Conference on i-SMAC (iot in Social, Mobile, Analytics and cloud) (i-SMAC), pp. 477\u2013480. IEEE (2017)","DOI":"10.1109\/I-SMAC.2017.8058395"},{"issue":"3","key":"4799_CR87","first-page":"355","volume":"9","author":"HA Abdul-Ghani","year":"2018","unstructured":"Abdul-Ghani, H.A., Konstantas, D., Mahyoub, M.: A comprehensive IoT attacks survey based on a building-blocked reference model. Int. J. Adv. Comput. Sci. Appl. 9(3), 355\u201373 (2018)","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"key":"4799_CR88","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.jnca.2015.09.001","volume":"58","author":"BJ Mohd","year":"2015","unstructured":"Mohd, B.J., Hayajneh, T., Vasilakos, A.V.: A survey on lightweight block ciphers for low-resource devices: comparative study and open issues. J. Netw. Comput. Appl. 58, 73\u201393 (2015)","journal-title":"J. Netw. Comput. Appl."},{"key":"4799_CR89","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.procs.2015.05.013","volume":"52","author":"SR Moosavi","year":"2015","unstructured":"Moosavi, S.R., Gia, T.N., Rahmani, A.-M., Nigussie, E., Virtanen, S., Isoaho, J., Tenhunen, H.: Sea: a secure and efficient authentication and authorization architecture for iot-based healthcare using smart gateways. Proced. Comput. Sci. 52, 452\u2013459 (2015)","journal-title":"Proced. Comput. Sci."},{"key":"4799_CR90","doi-asserted-by":"crossref","unstructured":"Wu, W., Zhang, L.: Lblock: a lightweight block cipher. In: International Conference on Applied Cryptography and Network Security, pp. 327\u2013344. Springer (2011)","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"4799_CR91","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J., Seurin, Y., Vikkelsoe, C.: Present: an ultra-lightweight block cipher. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 450\u2013466. Springer (2007)","DOI":"10.1007\/978-3-540-74735-2_31"},{"issue":"2","key":"4799_CR92","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s13389-017-0160-y","volume":"8","author":"G Hatzivasilis","year":"2018","unstructured":"Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I., Manifavas, C.: A review of lightweight block ciphers. J. Cryptogr. Eng. 8(2), 141\u2013184 (2018)","journal-title":"J. Cryptogr. Eng."},{"key":"4799_CR93","doi-asserted-by":"crossref","unstructured":"Lo\u2019ai, A.T., Somani, T.F.: More secure internet of things using robust encryption algorithms against side channel attacks. In: 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/AICCSA.2016.7945813"},{"issue":"5","key":"4799_CR94","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1109\/TIFS.2016.2516905","volume":"11","author":"F Zhang","year":"2016","unstructured":"Zhang, F., Guo, S., Zhao, X., Wang, T., Yang, J., Standaert, F.-X., Gu, D.: A framework for the analysis and evaluation of algebraic fault attacks on lightweight block ciphers. IEEE Trans. Inf. Forens. Secur. 11(5), 1039\u20131054 (2016)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"4799_CR95","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Rostami, M., Koushanfar, F., Wallach, D.S., Devadas, S.: Slender puf protocol: a lightweight, robust, and secure authentication by substring matching. In: 2012 IEEE Symposium on Security and Privacy Workshops, pp. 33\u201344. IEEE (2012)","DOI":"10.1109\/SPW.2012.30"},{"issue":"8","key":"4799_CR96","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder, C., Yu, M.-D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126\u20131141 (2014)","journal-title":"Proc. IEEE"},{"key":"4799_CR97","doi-asserted-by":"crossref","unstructured":"Canni\u00e8re, C.D., Dunkelman, O., Kne\u017eevi\u0107, M.: Katan and ktantan-a family of small and efficient hardware-oriented block ciphers. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 272\u2013288. Springer (2009)","DOI":"10.1007\/978-3-642-04138-9_20"},{"issue":"3","key":"4799_CR98","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s12095-012-0070-x","volume":"4","author":"MA Orumiehchiha","year":"2012","unstructured":"Orumiehchiha, M.A., Pieprzyk, J., Steinfeld, R.: Cryptanalysis of wg-7: a lightweight stream cipher. Cryptogr. Commun. 4(3), 277\u2013285 (2012)","journal-title":"Cryptogr. Commun."},{"key":"4799_CR99","doi-asserted-by":"crossref","unstructured":"Li, X., Wang, H., Yu, Y., Qian, C.: An iot data communication framework for authenticity and integrity. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 159\u2013170 (2017)","DOI":"10.1145\/3054977.3054982"},{"key":"4799_CR100","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Perrig, A., Van\u00a0Doorn, L., Khosla, P.: Swatt: software-based attestation for embedded devices. In: IEEE Symposium on Security and Privacy, 2004. Proceedings, pp. 272\u2013282. IEEE(2004)","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"4799_CR101","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., Van\u00a0Doorn, L., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In: Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, pp. 1\u201316 (2005)","DOI":"10.1145\/1095810.1095812"},{"issue":"1","key":"4799_CR102","first-page":"292","volume":"30","author":"LCB Ferreira","year":"2022","unstructured":"Ferreira, L.C.B., Yamaguti, R., Branquinho, O.C., Cardieri, P.: A tpm-based collaborative system to teach iot. Comput. Appl. Eng. Educ. 30(1), 292\u2013303 (2022)","journal-title":"Comput. Appl. Eng. Educ."},{"issue":"2","key":"4799_CR103","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3390\/fi14020035","volume":"14","author":"SM Altowaijri","year":"2022","unstructured":"Altowaijri, S.M.: Efficient next-hop selection in multi-hop routing for iot enabled wireless sensor networks. Fut. Internet 14(2), 35 (2022)","journal-title":"Fut. Internet"},{"key":"4799_CR104","doi-asserted-by":"crossref","unstructured":"Abera, T., Asokan, N., Davi, L., Koushanfar, F., Paverd, A., Sadeghi, A.-R., Tsudik, G.: Things, trouble, trust: on building trust in iot systems. In: Proceedings of the 53rd Annual Design Automation Conference, pp. 1\u20136 (2016)","DOI":"10.1145\/2897937.2905020"},{"key":"4799_CR105","doi-asserted-by":"crossref","unstructured":"Schulz, S., Sadeghi, A.-R., Wachsmann, C.: Short paper: Lightweight remote attestation using physical functions. In: Proceedings of the Fourth ACM Conference on Wireless Network Security, pp. 109\u2013114 (2011)","DOI":"10.1145\/1998412.1998432"},{"key":"4799_CR106","unstructured":"Asokan, N., Brasser, F., Ibrahim, A., Sadeghi, A.-R., Schunter, M., Tsudik, G., Wachsmann, C.: Seda: Scalable embedded device attestation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 964\u2013975 (2015)"},{"key":"4799_CR107","unstructured":"Ambrosin, M., Conti, M., Ibrahim, A., Neven, G., Sadeghi, A.-R., Schunter, M.: Sana: Secure and scalable aggregate network attestation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 731\u2013742 (2016)"},{"key":"4799_CR108","doi-asserted-by":"crossref","unstructured":"Abera, T., Asokan, N., Davi, L., Ekberg, J.-E., Nyman, T., Paverd, A., Sadeghi, A.-R., Tsudik, G.: C-flat: control-flow attestation for embedded systems software. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 743\u2013754 (2016)","DOI":"10.1145\/2976749.2978358"},{"key":"4799_CR109","doi-asserted-by":"crossref","unstructured":"Dessouky, G., Zeitouni, S., Nyman, T., Paverd, A., Davi, L., Koeberl, P., Asokan, N., Sadeghi, A.-R.: Lo-fat: low-overhead control flow attestation in hardware. In: Proceedings of the 54th Annual Design Automation Conference 2017, pp. 1\u20136 (2017)","DOI":"10.1145\/3061639.3062276"},{"key":"4799_CR110","doi-asserted-by":"crossref","unstructured":"Dragomir, D., Gheorghe, L., Costea, S., Radovici, A.: A survey on secure communication protocols for iot systems. In: 2016 International Workshop on Secure Internet of Things (SIoT), pp. 47\u201362. IEEE (2016)","DOI":"10.1109\/SIoT.2016.012"},{"key":"4799_CR111","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.cose.2013.05.007","volume":"37","author":"A Alcaide","year":"2013","unstructured":"Alcaide, A., Palomar, E., Montero-Castillo, J., Ribagorda, A.: Anonymous authentication for privacy-preserving iot target-driven applications. Comput. Secur. 37, 111\u2013123 (2013)","journal-title":"Comput. Secur."},{"issue":"1","key":"4799_CR112","first-page":"83","volume":"14","author":"C Su","year":"2015","unstructured":"Su, C., Santoso, B., Li, Y., Deng, R.H., Huang, X.: Universally composable rfid mutual authentication. IEEE Trans. Depend. Secur. Comput. 14(1), 83\u201394 (2015)","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"issue":"5","key":"4799_CR113","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MITP.2017.3680960","volume":"19","author":"H Kim","year":"2017","unstructured":"Kim, H., Lee, E.A.: Authentication and authorization for the internet of things. IT Prof. 19(5), 27\u201333 (2017)","journal-title":"IT Prof."},{"issue":"12","key":"4799_CR114","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1002\/sec.795","volume":"7","author":"JH Ziegeldorf","year":"2014","unstructured":"Ziegeldorf, J.H., Morchon, O.G., Wehrle, K.: Privacy in the internet of things: threats and challenges. Secur. Commun. Netw. 7(12), 2728\u20132742 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"4799_CR115","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.clsr.2015.07.002","volume":"31","author":"RH Weber","year":"2015","unstructured":"Weber, R.H.: Internet of things: Privacy issues revisited. Comput. Law Secur. Rev. 31(5), 618\u2013627 (2015)","journal-title":"Comput. Law Secur. Rev."},{"key":"4799_CR116","doi-asserted-by":"crossref","unstructured":"Kanuparthi, A., Karri, R., Addepalli, S.: Hardware and embedded security in the context of internet of things. In: Proceedings of the 2013 ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, pp. 61\u201364 (2013)","DOI":"10.1145\/2517968.2517976"},{"key":"4799_CR117","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.future.2017.04.045","volume":"75","author":"J Lopez","year":"2017","unstructured":"Lopez, J., Rios, R., Bao, F., Wang, G.: Evolving privacy: from sensors to the internet of things. Fut. Gener. Comput. Syst. 75, 46\u201357 (2017)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"4799_CR118","doi-asserted-by":"publisher","first-page":"10562","DOI":"10.1109\/ACCESS.2017.2706947","volume":"5","author":"R Mendes","year":"2017","unstructured":"Mendes, R., Vilela, J.P.: Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5, 10562\u201310582 (2017)","journal-title":"IEEE Access"},{"key":"4799_CR119","unstructured":"SQLi, X.S.: zero-days expose Belkin IoT devices, Android smartphones. (2016) [Internet]"},{"key":"4799_CR120","unstructured":"Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., Feamster, N.: Spying on the smart home: privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044 (2017)"},{"key":"4799_CR121","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/ACCESS.2017.2767561","volume":"6","author":"MA Sahi","year":"2017","unstructured":"Sahi, M.A., Abbas, H., Saleem, K., Yang, X., Derhab, A., Orgun, M.A., Iqbal, W., Rashid, I., Yaseen, A.: Privacy preservation in e-healthcare environments: state of the art and future directions. IEEE Access 6, 464\u2013478 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"4799_CR122","doi-asserted-by":"publisher","first-page":"23","DOI":"10.4304\/jsw.3.2.23-32","volume":"3","author":"B Riedl","year":"2008","unstructured":"Riedl, B., Grascher, V., Neubauer, T.: A secure e-health architecture based on the appliance of pseudonymization. J. Softw. 3(2), 23\u201332 (2008)","journal-title":"J. Softw."},{"issue":"2","key":"4799_CR123","first-page":"924","volume":"11","author":"X Liu","year":"2017","unstructured":"Liu, X., Li, Y., Qu, J., Ding, Y.: A lightweight pseudonym authentication and key agreement protocol for multi-medical server architecture in tmis. KSII Trans. Internet Inf. Syst. (TIIS) 11(2), 924\u2013944 (2017)","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"4799_CR124","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","volume":"129","author":"X Li","year":"2017","unstructured":"Li, X., Ibrahim, M.H., Kumari, S., Sangaiah, A.K., Gupta, V., Choo, K.-K.R.: Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Netw. 129, 429\u2013443 (2017)","journal-title":"Comput. Netw."},{"key":"4799_CR125","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comnet.2018.05.006","volume":"140","author":"AM Koya","year":"2018","unstructured":"Koya, A.M., Deepthi, P.: Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput. Netw. 140, 138\u2013151 (2018)","journal-title":"Comput. Netw."},{"key":"4799_CR126","doi-asserted-by":"publisher","first-page":"9114","DOI":"10.1109\/ACCESS.2018.2800288","volume":"6","author":"K Seol","year":"2018","unstructured":"Seol, K., Kim, Y.-G., Lee, E., Seo, Y.-D., Baik, D.-K.: Privacy-preserving attribute-based access control model for xml-based electronic health record system. IEEE Access 6, 9114\u20139128 (2018)","journal-title":"IEEE Access"},{"issue":"7","key":"4799_CR127","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1016\/j.comnet.2013.02.018","volume":"57","author":"C Rottondi","year":"2013","unstructured":"Rottondi, C., Verticale, G., Capone, A.: Privacy-preserving smart metering with multiple data consumers. Comput. Netw. 57(7), 1699\u20131713 (2013)","journal-title":"Comput. Netw."},{"issue":"5","key":"4799_CR128","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1007\/s12083-017-0618-9","volume":"11","author":"S Ge","year":"2018","unstructured":"Ge, S., Zeng, P., Lu, R., Choo, K.-K.R.: Fgda: Fine-grained data analysis in privacy-preserving smart grid communications. Peer-to-Peer Netw. Appl. 11(5), 966\u2013978 (2018)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"2","key":"4799_CR129","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TDSC.2015.2446492","volume":"14","author":"MA Rahman","year":"2015","unstructured":"Rahman, M.A., Manshaei, M.H., Al-Shaer, E., Shehab, M.: Secure and private data aggregation for energy consumption scheduling in smart grids. IEEE Trans. Depend. Secur. Comput. 14(2), 221\u2013234 (2015)","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"issue":"6","key":"4799_CR130","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TIFS.2017.2656475","volume":"12","author":"H Shen","year":"2017","unstructured":"Shen, H., Zhang, M., Shen, J.: Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans. Inf. Forens. Secur. 12(6), 1369\u20131381 (2017)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"1","key":"4799_CR131","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1109\/TII.2013.2277938","volume":"10","author":"C-I Fan","year":"2013","unstructured":"Fan, C.-I., Huang, S.-Y., Lai, Y.-L.: Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Industr. Inf. 10(1), 666\u2013675 (2013)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"4","key":"4799_CR132","doi-asserted-by":"publisher","first-page":"1710","DOI":"10.1109\/TSG.2015.2504395","volume":"8","author":"D Engel","year":"2015","unstructured":"Engel, D., Eibl, G.: Wavelet-based multiresolution smart meter privacy. IEEE Trans. Smart Grid 8(4), 1710\u20131721 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"4799_CR133","first-page":"1","volume":"48","author":"A Brown","year":"2023","unstructured":"Brown, A., Bennett, B., Brady, M., Tranter, K., Butler, D.: Regulating future driving: automated vehicles and the harmonisation of australian laws. Monash Univer. Law Rev. 48(3), 1\u201324 (2023)","journal-title":"Monash Univer. Law Rev."},{"key":"4799_CR134","unstructured":"Ripple issues urgent warning on quantum computing\u2019s threat to blockchain security\u2014bignewsnetwork.com. https:\/\/www.bignewsnetwork.com\/news\/274410269\/ripple-issues-urgent-warning-on-quantum-computing-threat-to-blockchain-security. Accessed 15 Jun 2024"},{"key":"4799_CR135","doi-asserted-by":"crossref","unstructured":"Singh, S., Sakk, E.: Implementation and analysis of shor\u2019s algorithm to break RSA cryptosystem security. Authorea Preprints (2024)","DOI":"10.36227\/techrxiv.170259160.05374043\/v2"},{"key":"4799_CR136","unstructured":"An Introduction to Post-Quantum Public Key Cryptography\u2014infoq.com. https:\/\/www.infoq.com\/articles\/post-quantum-cryptography-introduction\/#:~:text=Key%20Takeaways%201%20Quantum%20computers%20pose%20a%20serious,quantum%20computers%27%20threat%20to%20current%20encryption.%20More%20items"},{"key":"4799_CR137","unstructured":"Houston-Edwards, K.: Tomorrow\u2019s quantum computers threaten today\u2019s secrets. Here\u2019s How to Protect Them\u2014scientificamerican.com. https:\/\/www.scientificamerican.com\/article\/tomorrows-quantum-computers-threaten-todays-secrets-heres-how-to-protect-them-2\/. Accessed 15 Jun 2024"},{"key":"4799_CR138","unstructured":"Maes, R.: Addressing quantum computing threats With SRAM PUFs\u2014semiengineering.com. https:\/\/semiengineering.com\/addressing-quantum-computing-threats-with-sram-pufs\/. Accessed 15 Jun 2024"},{"key":"4799_CR139","unstructured":"Walker, A.: Quantum computing is set to destroy crypto. Could cloud-based quantum-proof encryption be the solution?\u2014cloudcomputing-news.net. https:\/\/www.cloudcomputing-news.net\/news\/2024\/jun\/03\/quantum-computing-is-set-to-destroy-crypto-could-cloud-based-quantum-proof-encryption-be-the-solution\/. Accessed 15 Jun 2024"},{"key":"4799_CR140","unstructured":"Harris, I.G.: Social engineering attacks on the internet of things. IoT Newsletter. (2016)"},{"key":"4799_CR141","doi-asserted-by":"crossref","unstructured":"Javed, B., Iqbal, M.W., Abbas, H.: Internet of things (iot) design considerations for developers and manufacturers. In: 2017 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 834\u2013839. IEEE (2017)","DOI":"10.1109\/ICCW.2017.7962762"},{"key":"4799_CR142","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jaging.2018.01.009","volume":"45","author":"S Katz","year":"2018","unstructured":"Katz, S., Marshall, B.L.: Tracked and fit: Fitbits, brain games, and the quantified aging body. J. Aging Stud. 45, 63\u201368 (2018)","journal-title":"J. Aging Stud."},{"key":"4799_CR143","unstructured":"Cyr, B., Horn, W., Miao, D., Specter, M.: Security analysis of wearable fitness devices (fitbit). Massachusetts Inst. Technol. (2014)"},{"key":"4799_CR144","doi-asserted-by":"crossref","unstructured":"Voigt, P., Bussche, A.: The eu general data protection regulation (GDPR). In: A Practical Guide, 1st edn., vol. 10, no. 3152676, pp. 10\u20135555. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-57959-7"},{"key":"4799_CR145","doi-asserted-by":"crossref","unstructured":"Wilamowski, B.M.: Challenges in applications of computational intelligence in industrial electronics. In: 2010 IEEE International Symposium on Industrial Electronics, pp. 15\u201322. IEEE (2010)","DOI":"10.1109\/ISIE.2010.5637934"},{"issue":"4","key":"4799_CR146","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/SURV.2011.122111.00145","volume":"14","author":"J Liu","year":"2012","unstructured":"Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.P.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutor. 14(4), 981\u2013997 (2012)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4799_CR147","doi-asserted-by":"crossref","unstructured":"Dalipi, F., Yayilgan, S.Y.: Security and privacy considerations for iot application on smart grids: Survey and research challenges. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 63\u201368. IEEE (2016)","DOI":"10.1109\/W-FiCloud.2016.28"},{"key":"4799_CR148","doi-asserted-by":"crossref","unstructured":"Khelifa, B., Abla, S.: Security concerns in smart grids: Threats, vulnerabilities and countermeasures. In: 2015 3rd International Renewable and Sustainable Energy Conference (IRSEC), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/IRSEC.2015.7454963"},{"key":"4799_CR149","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/S2212-5671(12)00041-X","volume":"1","author":"AC Serban","year":"2012","unstructured":"Serban, A.C.: Aging population and effects on labour market. Proced. Econ. Finance 1, 356\u2013364 (2012)","journal-title":"Proced. Econ. Finance"},{"key":"4799_CR150","unstructured":"AL-mawee, W.: Privacy and security issues in IoT healthcare applications for the disabled users a survey (2012)"},{"key":"4799_CR151","doi-asserted-by":"crossref","unstructured":"Leng, Y., Zhao, L.: Novel design of intelligent internet-of-vehicles management system based on cloud-computing and internet-of-things. In: Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology, vol. 6, pp. 3190\u20133193. IEEE (2011)","DOI":"10.1109\/EMEIT.2011.6023763"},{"key":"4799_CR152","doi-asserted-by":"crossref","unstructured":"Gerla, M., Lee, E.-K., Pau, G., Lee, U.: Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 241\u2013246. IEEE (2014)","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"4799_CR153","unstructured":"Minhas, R., Tilal, M.: Effects of jamming on IEEE 802.11 p systems (2010)"},{"issue":"2","key":"4799_CR154","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.vehcom.2014.05.001","volume":"1","author":"MN Mejri","year":"2014","unstructured":"Mejri, M.N., Ben-Othman, J., Hamdi, M.: Survey on vanet security challenges and possible cryptographic solutions. Vehic. Commun. 1(2), 53\u201366 (2014)","journal-title":"Vehic. Commun."},{"issue":"11","key":"4799_CR155","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1080\/24725854.2018.1555383","volume":"51","author":"H Yang","year":"2019","unstructured":"Yang, H., Kumara, S., Bukkapatnam, S.T., Tsung, F.: The internet of things for smart manufacturing: a review. IISE Trans. 51(11), 1190\u20131216 (2019)","journal-title":"IISE Trans."},{"key":"4799_CR156","doi-asserted-by":"crossref","unstructured":"Miller, B., Rowe, D.: A survey scada of and critical infrastructure incidents. In: Proceedings of the 1st Annual Conference on Research in Information Technology, pp. 51\u201356 (2012)","DOI":"10.1145\/2380790.2380805"},{"issue":"13","key":"4799_CR157","first-page":"2017","volume":"16","author":"M Holloway","year":"2015","unstructured":"Holloway, M.: Stuxnet worm attack on iranian nuclear facilities. Retrieved Apr. 16(13), 2017 (2015)","journal-title":"Retrieved Apr"},{"key":"4799_CR158","unstructured":"Robles, R.J., Kim, T.H., Cook, D., Das, S.: A review on security in smart home development. Int. J. Adv. Sci. Res. (2010)"},{"key":"4799_CR159","doi-asserted-by":"crossref","unstructured":"Agosta, G., Antonini, A., Barenghi, A., Galeri, D., Pelosi, G.: Cyber-security analysis and evaluation for smart home management solutions. In: 2015 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/CCST.2015.7389663"},{"key":"4799_CR160","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","volume":"86","author":"M Shuai","year":"2019","unstructured":"Shuai, M., Yu, N., Wang, H., Xiong, L.: Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 86, 132\u2013146 (2019)","journal-title":"Comput. Secur."},{"key":"4799_CR161","doi-asserted-by":"crossref","unstructured":"Lee, C., Zappaterra, L., Choi, K., Choi, H.-A.: Securing smart home: technologies, security challenges, and security requirements. In: 2014 IEEE Conference on Communications and Network Security, pp. 67\u201372. IEEE (2014)","DOI":"10.1109\/CNS.2014.6997467"},{"issue":"20","key":"4799_CR162","doi-asserted-by":"publisher","first-page":"12749","DOI":"10.1007\/s11042-016-3252-2","volume":"75","author":"S Lee","year":"2016","unstructured":"Lee, S., Kim, J., Shon, T.: User privacy-enhanced security architecture for home area network of smartgrid. Multimedia Tools Appl. 75(20), 12749\u201312764 (2016)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"4799_CR163","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher, P., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptogr. Eng. 1(1), 5\u201327 (2011)","journal-title":"J. Cryptogr. Eng."},{"issue":"1\u20134","key":"4799_CR164","first-page":"29","volume":"9","author":"YF Alias","year":"2017","unstructured":"Alias, Y.F., Isa, M.A.M., Hashim, H.: Timing attack: An analysis of preliminary data. J. Telecommun. (JTEC), Electron. Comput. Eng. 9(1\u20134), 29\u201332 (2017)","journal-title":"J. Telecommun. (JTEC), Electron. Comput. Eng."},{"issue":"11","key":"4799_CR165","first-page":"73","volume":"10","author":"D Desai","year":"2014","unstructured":"Desai, D., Upadhyay, H.: Security and privacy consideration for internet of things in smart home environments. Int. J. Eng. Res. Dev. 10(11), 73\u201383 (2014)","journal-title":"Int. J. Eng. Res. Dev."},{"issue":"3","key":"4799_CR166","first-page":"19","volume":"8","author":"KW Ching","year":"2016","unstructured":"Ching, K.W., Singh, M.M.: Wearable technology devices security and privacy vulnerability analysis. Int. J. Netw. Secur. Appl. 8(3), 19\u201330 (2016)","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"4799_CR167","doi-asserted-by":"crossref","unstructured":"Liu, Y., Hatzinakos, D.: Human acoustic fingerprints: a novel biometric modality for mobile security. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3784\u20133788. IEEE (2014)","DOI":"10.1109\/ICASSP.2014.6854309"},{"issue":"1","key":"4799_CR168","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"M Al Ameen","year":"2012","unstructured":"Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93\u2013101 (2012)","journal-title":"J. Med. Syst."},{"key":"4799_CR169","doi-asserted-by":"crossref","unstructured":"Li, S., Ashok, A., Zhang, Y., Xu, C., Lindqvist, J., Gruteser, M.: Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns. In: 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 1\u20139. IEEE (2016)","DOI":"10.1109\/PERCOMW.2016.7457076"},{"key":"4799_CR170","doi-asserted-by":"crossref","unstructured":"Lee, J.-S., Su, Y.-W., Shen, C.-C.: A comparative study of wireless protocols: bluetooth, uwb, zigbee, and wi-fi. In: IECON 2007-33rd Annual Conference of the IEEE Industrial Electronics Society, pp. 46\u201351. IEEE (2007)","DOI":"10.1109\/IECON.2007.4460126"},{"key":"4799_CR171","doi-asserted-by":"crossref","unstructured":"Chen, H., Jia, X., Li, H.: A brief introduction to iot gateway. In: IET International Conference on Communication Technology and Application (ICCTA 2011), pp. 610\u2013613. IET (2011)","DOI":"10.1049\/cp.2011.0740"},{"key":"4799_CR172","doi-asserted-by":"crossref","unstructured":"Zhang, Z.-K., Cho, M.C.Y., Shieh, S.: Emerging security threats and countermeasures in iot. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 1\u20136 (2015)","DOI":"10.1145\/2714576.2737091"},{"key":"4799_CR173","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.techfore.2016.08.032","volume":"116","author":"D Barnard-Wills","year":"2017","unstructured":"Barnard-Wills, D.: The technology foresight activities of European union data protection authorities. Technol. Forecast. Soc. Chang. 116, 142\u2013150 (2017)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"4799_CR174","doi-asserted-by":"crossref","unstructured":"Wang, C., Guo, X., Wang, Y., Chen, Y., Liu, B.: Friend or foe? Your wearable devices reveal your personal pin. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 189\u2013200 (2016)","DOI":"10.1145\/2897845.2897847"},{"key":"4799_CR175","doi-asserted-by":"crossref","unstructured":"Enamamu, T.S., Clarke, N., Haskell-Dowland, P., Li, F.: Smart watch based body-temperature authentication. In: 2017 International Conference on Computing Networking and Informatics (ICCNI), pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/ICCNI.2017.8123790"},{"key":"4799_CR176","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.maturitas.2018.04.012","volume":"113","author":"A Godfrey","year":"2018","unstructured":"Godfrey, A., Hetherington, V., Shum, H., Bonato, P., Lovell, N., Stuart, S.: From a to z: wearable technology explained. Maturitas 113, 40\u201347 (2018)","journal-title":"Maturitas"},{"key":"4799_CR177","unstructured":"Patel, K.K., Patel, S.M., Scholar, P.: Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. (2016)"},{"issue":"4","key":"4799_CR178","doi-asserted-by":"publisher","first-page":"395","DOI":"10.3233\/AIS-170440","volume":"9","author":"PP Ray","year":"2017","unstructured":"Ray, P.P.: Internet of things for smart agriculture: technologies, practices and future direction. J. Ambient Intell. Smart Environ. 9(4), 395\u2013420 (2017)","journal-title":"J. Ambient Intell. Smart Environ."},{"key":"4799_CR179","doi-asserted-by":"crossref","unstructured":"Zyrianoff, I., Heideker, A., Silva, D., Kamienski, C.: Scalability of an internet of things platform for smart water management for agriculture. In: 2018 23rd Conference of Open Innovations Association (FRUCT), pp. 432\u2013439. IEEE (2018)","DOI":"10.23919\/FRUCT.2018.8588086"},{"issue":"2","key":"4799_CR180","first-page":"395","volume":"27","author":"L Wu","year":"2016","unstructured":"Wu, L., Yue, X., Jin, A., Yen, D.C.: Smart supply chain management: A review and implications for future research. Int. J. Log. Manag. 27(2), 395\u2013417 (2016)","journal-title":"Int. J. Log. Manag."},{"key":"4799_CR181","doi-asserted-by":"crossref","unstructured":"Yuvaraj, S., Sangeetha, M.: Smart supply chain management using internet of things (iot) and low power wireless communication systems. In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 555\u2013558. IEEE (2016)","DOI":"10.1109\/WiSPNET.2016.7566196"},{"issue":"2","key":"4799_CR182","first-page":"254","volume":"19","author":"Z Williams","year":"2008","unstructured":"Williams, Z., Lueg, J.E., LeMay, S.A.: Supply chain security: an overview and research agenda. Int. J. Log. Manag. 19(2), 254\u201381 (2008)","journal-title":"Int. J. Log. Manag."},{"issue":"6","key":"4799_CR183","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1108\/13598540710826371","volume":"12","author":"CW Lee","year":"2007","unstructured":"Lee, C.W., Kwon, I.W., Severance, D.: Relationship between supply chain performance and degree of linkage among supplier, internal integration, and customer. Supply Chain Manag. Int. J. 12(6), 444\u201352 (2007)","journal-title":"Supply Chain Manag. Int. J."},{"issue":"4","key":"4799_CR184","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The internet of things (iot): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"issue":"7","key":"4799_CR185","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1080\/0954412022000017067","volume":"13","author":"P Romano","year":"2002","unstructured":"Romano, P.: Impact of supply chain sensitivity to quality certification on quality management practices and performances. Total Qual. Manag. 13(7), 981\u20131000 (2002)","journal-title":"Total Qual. Manag."},{"issue":"4","key":"4799_CR186","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1002\/csr.207","volume":"17","author":"S Gold","year":"2010","unstructured":"Gold, S., Seuring, S., Beske, P.: Sustainable supply chain management and inter-organizational resources: a literature review. Corp. Soc. Responsib. Environ. Manag. 17(4), 230\u2013245 (2010)","journal-title":"Corp. Soc. Responsib. Environ. Manag."},{"issue":"7\/8","key":"4799_CR187","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1108\/09600030010346521","volume":"30","author":"M Warren","year":"2000","unstructured":"Warren, M., Hutchinson, W.: Cyber attacks against supply chain management systems: a short note. Int. J.\nPhys. Distrib. Log. Manag. 30(7\/8), 710\u20136 (2000)","journal-title":"Int. J. Phys. Distrib. Log. Manag."},{"issue":"2","key":"4799_CR188","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1111\/j.1540-5915.2009.00232.x","volume":"40","author":"LD Fredendall","year":"2009","unstructured":"Fredendall, L.D., Craig, J.B., Fowler, P.J., Damali, U.: Barriers to swift, even flow in the internal supply chain of perioperative surgical services department: a case study. Decis. Sci. 40(2), 327\u2013349 (2009)","journal-title":"Decis. Sci."},{"key":"4799_CR189","doi-asserted-by":"crossref","unstructured":"Kodali, R.K., Jain, V., Bose, S., Boppana, L.: Iot based smart security and home automation system. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 1286\u20131289. IEEE (2016)","DOI":"10.1109\/CCAA.2016.7813916"},{"key":"4799_CR190","doi-asserted-by":"crossref","unstructured":"Bocchetti, G., Flammini, F., Pragliola, C., Pappalardo, A.: Dependable integrated surveillance systems for the physical security of metro railways. In: 2009 3rd ACM\/IEEE International Conference on Distributed Smart Cameras (ICDSC), pp. 1\u20137. IEEE (2009)","DOI":"10.1109\/ICDSC.2009.5289385"},{"issue":"1","key":"4799_CR191","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.ijcip.2013.02.001","volume":"6","author":"C Finke","year":"2013","unstructured":"Finke, C., Butts, J., Mills, R., Grimaila, M.: Enhancing the security of aircraft surveillance in the next generation air traffic control system. Int. J. Crit. Infrastruct. Prot. 6(1), 3\u201311 (2013)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"4","key":"4799_CR192","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1111\/1468-2338.00277","volume":"34","author":"P Findlay","year":"2003","unstructured":"Findlay, P., McKinlay, A.: Surveillance, electronic communications technologies and regulation. Ind. Relat. J. 34(4), 305\u2013318 (2003)","journal-title":"Ind. Relat. J."},{"key":"4799_CR193","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"4799_CR194","doi-asserted-by":"crossref","unstructured":"Duncan, B., Happe, A., Bratterud, A.: Enterprise iot security and scalability: how unikernels can improve the status quo. In: 2016 IEEE\/ACM 9th International Conference on Utility and Cloud Computing (UCC), pp. 292\u2013297. IEEE (2016)","DOI":"10.1145\/2996890.3007875"},{"issue":"6","key":"4799_CR195","doi-asserted-by":"publisher","first-page":"201","DOI":"10.14257\/ijsh.2013.7.6.19","volume":"7","author":"J Bangali","year":"2013","unstructured":"Bangali, J., Shaligram, A.: Design and implementation of security systems for smart home based on gsm technology. Int. J. Smart Home 7(6), 201\u2013208 (2013)","journal-title":"Int. J. Smart Home"},{"key":"4799_CR196","unstructured":"Nayak, M., Dash, P.: Smart surveillance monitoring system using Raspberry Pi and PIR sensor. Statistics. (2014)"},{"key":"4799_CR197","doi-asserted-by":"crossref","unstructured":"Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 Ieee World Congress on Services, pp. 21\u201328. IEEE (2015)","DOI":"10.1109\/SERVICES.2015.12"},{"issue":"3","key":"4799_CR198","first-page":"45","volume":"4","author":"Y Pan","year":"2017","unstructured":"Pan, Y., White, J., Schmidt, D., Elhabashy, A., Sturm, L., Camelio, J., Williams, C.: Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems. Int. j. Interact. Multimed. Artif. Intell. 4(3), 45\u201354 (2017)","journal-title":"Int. j. Interact. Multimed. Artif. Intell."},{"key":"4799_CR199","doi-asserted-by":"crossref","unstructured":"Al-Qaseemi, S.A., Almulhim, H.A., Almulhim, M.F., Chaudhry, S.R.: Iot architecture challenges and issues: Lack of standardization. In: 2016 Future Technologies Conference (FTC), pp. 731\u2013738. IEEE (2016)","DOI":"10.1109\/FTC.2016.7821686"},{"issue":"2","key":"4799_CR200","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1023\/A:1008302122286","volume":"19","author":"UM Maurer","year":"2000","unstructured":"Maurer, U.M., Wolf, S.: The Diffie\u2013Hellman protocol. Des. Codes Crypt. 19(2), 147\u2013171 (2000)","journal-title":"Des. Codes Crypt."},{"key":"4799_CR201","unstructured":"Saho, N.J.G., Ezin, E.C.: Comparative study on the performance of elliptic curve cryptography algorithms with cryptography through rsa algorithm. In: CARI 2020-Colloque Africain sur la Recherche en Informatique et en Math\u00e9matiques Apliqu\u00e9es (2020)"},{"issue":"8","key":"4799_CR202","doi-asserted-by":"publisher","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","volume":"11","author":"T Kothmayr","year":"2013","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Br\u00fcnig, M., Carle, G.: Dtls based security and two-way authentication for the internet of things. Ad Hoc Netw. 11(8), 2710\u20132723 (2013)","journal-title":"Ad Hoc Netw."},{"key":"4799_CR203","first-page":"115","volume-title":"Culler D","author":"P Levis","year":"2005","unstructured":"Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E.: Culler D, An operating system for sensor networks. Ambient intelligence, TinyOS pp. 115\u201348 (2005)"},{"key":"4799_CR204","doi-asserted-by":"crossref","unstructured":"Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K.: Rfc 3830: Mikey: multimedia internet keying (2004)","DOI":"10.17487\/rfc3830"},{"key":"4799_CR205","doi-asserted-by":"crossref","unstructured":"Nguyen, K.T., Oualha, N., Laurent, M.: Novel lightweight signcryption-based key distribution mechanisms for mikey. In: Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26\u201327, 2016, Proceedings 10, pp. 19\u201334. Springer (2016)","DOI":"10.1007\/978-3-319-45931-8_2"},{"key":"4799_CR206","unstructured":"Moskowitz, R., Heer, T., Jokela, P., Henderson, T.: Host identity protocol version 2 (HIPv2). (2015)"},{"key":"4799_CR207","doi-asserted-by":"crossref","unstructured":"Khairuddin, A., Azir, K.F.K., Kan, P.E.: Limitations and future of electrocardiography devices: A review and the perspective from the internet of things. In: 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/ICRIIS.2017.8002506"},{"issue":"5","key":"4799_CR208","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","volume":"35","author":"L Xiao","year":"2018","unstructured":"Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: Iot security techniques based on machine learning: How do iot devices use ai to enhance security? IEEE Signal Process. Mag. 35(5), 41\u201349 (2018)","journal-title":"IEEE Signal Process. Mag."},{"key":"4799_CR209","first-page":"26","volume":"14","author":"A Banafa","year":"2017","unstructured":"Banafa, A.: Three major challenges facing iot. IEEE Internet Things. 14, 26\u201367 (2017)","journal-title":"IEEE Internet Things."},{"key":"4799_CR210","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.comnet.2018.01.039","volume":"134","author":"W Feng","year":"2018","unstructured":"Feng, W., Qin, Y., Zhao, S., Feng, D.: Aaot: lightweight attestation and authentication of low-resource things in iot and cps. Comput. Netw. 134, 167\u2013182 (2018)","journal-title":"Comput. Netw."},{"key":"4799_CR211","doi-asserted-by":"crossref","unstructured":"Lange, T., Steinwandt, R.: Post-quantum cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9\u201311, 2018, Proceedings, vol. 10786. Springer (2018)","DOI":"10.1007\/978-3-319-79063-3"},{"key":"4799_CR212","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: A performance study. Cryptology ePrint Archive (2020)","DOI":"10.14722\/ndss.2020.24203"},{"issue":"5","key":"4799_CR213","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s00287-019-01200-2","volume":"42","author":"J Kr\u00e4mer","year":"2019","unstructured":"Kr\u00e4mer, J.: Post-quantum cryptography and its application to the iot. Informat. Spektrum 42(5), 343\u2013344 (2019)","journal-title":"Informat. Spektrum"},{"key":"4799_CR214","unstructured":"Bernstein, D.J., Lange, T.: \u201cThe year in post-quantum crypto. PQC Event\u201d (2018)"},{"key":"4799_CR215","doi-asserted-by":"crossref","unstructured":"Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 99\u2013108 (1996)","DOI":"10.1145\/237814.237838"},{"key":"4799_CR216","doi-asserted-by":"crossref","unstructured":"Ajtai, M.: Representing hard lattices with o (n log n) bits. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 94\u2013103 (2005)","DOI":"10.1145\/1060590.1060604"},{"key":"4799_CR217","doi-asserted-by":"crossref","unstructured":"Peikert, C., et\u00a0al.: A decade of lattice cryptography. Found. Trends\u00ae Theor. Comput. Sci. 10(4), 283\u2013424 (2016)","DOI":"10.1561\/0400000074"},{"issue":"2","key":"4799_CR218","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"issue":"1","key":"4799_CR219","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.96.012306","volume":"96","author":"A Bocharov","year":"2017","unstructured":"Bocharov, A., Roetteler, M., Svore, K.M.: Factoring with qutrits: shor\u2019s algorithm on ternary and metaplectic quantum architectures. Phys. Rev. A 96(1), 012306 (2017)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"4799_CR220","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1920-z","volume":"17","author":"D Ghosh","year":"2018","unstructured":"Ghosh, D., Agarwal, P., Pandey, P., Behera, B.K., Panigrahi, P.K.: Automated error correction in ibm quantum computer and explicit generalization. Quantum Inf. Process. 17(6), 1\u201324 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"4799_CR221","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/0550-3213(83)90504-7","volume":"220","author":"DI Olive","year":"1983","unstructured":"Olive, D.I., Turok, N.: Algebraic structure of toda systems. Nucl. Phys. B 220(4), 491\u2013507 (1983)","journal-title":"Nucl. Phys. B"},{"issue":"4","key":"4799_CR222","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TIT.2004.825045","volume":"50","author":"E Bayer-Fluckiger","year":"2004","unstructured":"Bayer-Fluckiger, E., Oggier, F., Viterbo, E.: New algebraic constructions of rotated z\/sup n\/-lattice constellations for the Rayleigh fading channel. IEEE Trans. Inf. Theory 50(4), 702\u2013714 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4799_CR223","doi-asserted-by":"crossref","unstructured":"Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pp. 333\u2013342 (2009)","DOI":"10.1145\/1536414.1536461"},{"key":"4799_CR224","doi-asserted-by":"crossref","unstructured":"Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, pp. 601\u2013610 (2001)","DOI":"10.1145\/380752.380857"},{"key":"4799_CR225","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Howgrave-Graham, N., Pipher, J., Whyte, W.: Practical lattice-based cryptography: Ntruencrypt and ntrusign. In: The LLL Algorithm, pp. 349\u2013390. Springer (2009)","DOI":"10.1007\/978-3-642-02295-1_11"},{"issue":"6","key":"4799_CR226","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1\u201340 (2009)","journal-title":"J. ACM (JACM)"},{"issue":"6","key":"4799_CR227","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Post-quantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. (CSUR) 51(6), 1\u201341 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"4799_CR228","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: Introduction to post-quantum cryptography. In: Post-quantum Cryptography, pp. 1\u201314. Springer (2009)","DOI":"10.1007\/978-3-540-88702-7_1"},{"key":"4799_CR229","unstructured":"Ustimenko, V.\" \u201cOn semigroups of multivariate transformations constructed in terms of time dependent linguistic graphs and solutions of post quantum multivariate cryptography.\u201d Cryptology ePrint Archive (2021)"},{"issue":"4","key":"4799_CR230","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2017.3151328","volume":"15","author":"J Ding","year":"2017","unstructured":"Ding, J., Petzoldt, A.: Current state of multivariate cryptography. IEEE Secur. Privacy 15(4), 28\u201336 (2017)","journal-title":"IEEE Secur. Privacy"},{"key":"4799_CR231","unstructured":"Lamport, L.: Constructing digital signatures from a one way function (1979)"},{"key":"4799_CR232","doi-asserted-by":"crossref","unstructured":"Bansarkhani, R.E., Misoczki, R.: G-merkle: A hash-based group signature scheme from standard assumptions. In: International Conference on Post-Quantum Cryptography, pp. 441\u2013463. Springer (2018)","DOI":"10.1007\/978-3-319-79063-3_21"},{"issue":"7","key":"4799_CR233","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (iot): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"4799_CR234","doi-asserted-by":"crossref","unstructured":"Jao, D., Miller, S.D., Venkatesan, R.: Do all elliptic curves of the same order have the same difficulty of discrete log? In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 21\u201340. Springer (2005)","DOI":"10.1007\/11593447_2"},{"issue":"1","key":"4799_CR235","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jmc-2012-0016","volume":"8","author":"A Childs","year":"2014","unstructured":"Childs, A., Jao, D., Soukharev, V.: Constructing elliptic curve isogenies in quantum subexponential time. J. Math. Cryptol. 8(1), 1\u201329 (2014)","journal-title":"J. Math. Cryptol."},{"issue":"3","key":"4799_CR236","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1515\/jmc-2012-0015","volume":"8","author":"L De Feo","year":"2014","unstructured":"De Feo, L., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209\u2013247 (2014)","journal-title":"J. Math. Cryptol."},{"issue":"3","key":"4799_CR237","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/TIT.2019.2938984","volume":"66","author":"S Kim","year":"2019","unstructured":"Kim, S., Yoon, K., Kwon, J., Park, Y.-H., Hong, S.: New hybrid method for isogeny-based cryptosystems using edwards curves. IEEE Trans. Inf. Theory 66(3), 1934\u20131943 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4799_CR238","doi-asserted-by":"crossref","unstructured":"Jao, D., Feo, L.D.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: International Workshop on Post-Quantum Cryptography, pp. 19\u201334. Springer (2011)","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"4799_CR239","unstructured":"Meyer, M., Reith, S., Campos, F.: \u201cOn hybrid sidh schemes using edwards and montgomery curve arithmetic.\u201d Cryptology ePrint Archive (2017)"},{"key":"4799_CR240","doi-asserted-by":"crossref","unstructured":"Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Miller, C., Moody, D., Peralta, R., et al.: Status report on the third round of the nist post-quantum cryptography standardization process. US Department of Commerce, NIST (2022)","DOI":"10.6028\/NIST.IR.8413"},{"key":"4799_CR241","unstructured":"Bernstein, D.J., Chou, T., Lange, T., von Maurich, I., Misoczki, R., Niederhagen, R., Persichetti, E., Peters, C., Schwabe, P., Sendrier, N., Szefer, J.: Classic McEliece: Conservative code-based cryptography. Project documentation:[\u042d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0439 \u0440\u0435\u0441\u0443\u0440\u0441]. \u0420\u0435\u0436\u0438\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0430: https:\/\/classic.mceliece.org\/nist\/mceliece-20190331. pdf, \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u044b\u0439. \u042f\u0437. \u0430\u043d\u0433\u043b.(\u0434\u0430\u0442\u0430 \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u044f: 24.12. 2021). (2017)"},{"issue":"3","key":"4799_CR242","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","volume":"75","author":"A Langlois","year":"2015","unstructured":"Langlois, A., Stehl\u00e9, D.: Worst-case to average-case reductions for module lattices. Des. Codes Crypt. 75(3), 565\u2013599 (2015)","journal-title":"Des. Codes Crypt."},{"key":"4799_CR243","unstructured":"Aguilar, C., Blazy, O., Deneuville, J.-C., Gaborit, P., Z\u00e9mor, G.: Efficient encryption from random quasi-cyclic codes (2016). arXiv preprint arXiv:1612.05572"},{"issue":"48","key":"4799_CR244","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i48\/105551","volume":"9","author":"S Gupta","year":"2016","unstructured":"Gupta, S., Dutta, C.: Internet of things security analysis of networks using quantum key distribution. Indian J. Sci. Technol. 9(48), 105551 (2016)","journal-title":"Indian J. Sci. Technol."},{"key":"4799_CR245","doi-asserted-by":"crossref","unstructured":"Bos, J.W., Costello, C., Naehrig, M., Stebila, D.: Post-quantum key exchange for the tls protocol from the ring learning with errors problem. In: 2015 IEEE Symposium on Security and Privacy, pp. 553\u2013570. IEEE (2015)","DOI":"10.1109\/SP.2015.40"},{"issue":"3","key":"4799_CR246","doi-asserted-by":"publisher","first-page":"4897","DOI":"10.1109\/JIOT.2018.2878707","volume":"6","author":"R Chaudhary","year":"2018","unstructured":"Chaudhary, R., Aujla, G.S., Kumar, N., Zeadally, S.: Lattice-based public key cryptosystem for internet of things environment: challenges and solutions. IEEE Internet Things J. 6(3), 4897\u20134909 (2018)","journal-title":"IEEE Internet Things J."},{"key":"4799_CR247","doi-asserted-by":"crossref","unstructured":"Koziel, B., Azarderakhsh, R., Kermani, M.M., Jao, D.: Post-quantum cryptography on fpga based on isogenies on elliptic curves. IEEE Trans. Circuits Syst. I Regul. Pap. 64(1), 86\u201399 (2016)","DOI":"10.1109\/TCSI.2016.2611561"},{"key":"4799_CR248","doi-asserted-by":"crossref","unstructured":"Costello, C., Longa, P., Naehrig, M.: Efficient algorithms for supersingular isogeny diffie-hellman. In: Annual International Cryptology Conference, pp. 572\u2013601. Springer (2016)","DOI":"10.1007\/978-3-662-53018-4_21"},{"key":"4799_CR249","unstructured":"Round 1 Submissions - Post-Quantum Cryptography | CSRC | CSRC --- csrc.nist.gov. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/round-1-submissions, [Accessed 30-10-2024]"},{"key":"4799_CR250","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V.: Lattice signatures without trapdoors. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 738\u2013755. Springer (2012)","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"4799_CR251","doi-asserted-by":"crossref","unstructured":"Kiltz, E., Lyubashevsky, V., Schaffner, C.: A concrete treatment of fiat-shamir signatures in the quantum random-oracle model. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 552\u2013586. Springer (2018)","DOI":"10.1007\/978-3-319-78372-7_18"},{"issue":"3","key":"4799_CR252","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."},{"key":"4799_CR253","doi-asserted-by":"crossref","unstructured":"Liu, Q., Zhandry, M.: Revisiting post-quantum fiat-shamir. In: Annual International Cryptology Conference, pp. 326\u2013355. Springer (2019)","DOI":"10.1007\/978-3-030-26951-7_12"},{"key":"4799_CR254","doi-asserted-by":"crossref","unstructured":"Don, J., Fehr, S., Majenz, C.: The measure-and-reprogram technique 2.0: multi-round fiat-shamir and more. In: Annual International Cryptology Conference, pp. 602\u2013631. Springer (2020)","DOI":"10.1007\/978-3-030-56877-1_21"},{"key":"4799_CR255","doi-asserted-by":"crossref","unstructured":"Patarin, J., Courtois, N., Goubin, L.: Quartz, 128-bit long digital signatures. In: Cryptographers\u2019 Track at the RSA Conference, pp. 282\u2013297. Springer (2001)","DOI":"10.1007\/3-540-45353-9_21"},{"key":"4799_CR256","doi-asserted-by":"crossref","unstructured":"Gaborit, P.\"Post-quantum cryptography\". Lect. Notes Comput. Sci. 7932 (2013)","DOI":"10.1007\/978-3-642-38616-9"},{"key":"4799_CR257","doi-asserted-by":"crossref","unstructured":"Patarin, J.: Hidden fields equations (HFE) and isomorphisms of polynomials (ip): two new families of asymmetric algorithms. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 33\u201348. Springer (1996)","DOI":"10.1007\/3-540-68339-9_4"},{"key":"4799_CR258","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The sphincs+ signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2129\u20132146 (2019)","DOI":"10.1145\/3319535.3363229"},{"key":"4799_CR259","unstructured":"Announcing PQC Candidates to be Standardized, Plus Fourth Round Candidates|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/News\/2022\/pqc-candidates-to-be-standardized-and-round-4. Accessed 25 Feb 2023"},{"key":"4799_CR260","unstructured":"NIST PQC: Looking into the Future|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/nist-pqc-looking-into-the-future. Accessed 26 Feb 2023"},{"key":"4799_CR261","unstructured":"CRYSTALS-Kyber Update|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/crystals-kyber-update. Accessed 26 Feb 2023"},{"key":"4799_CR262","unstructured":"CRYSTALS-Dilithium Update|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/crystals-dilithium-update. Accessed 26 Feb 2023"},{"key":"4799_CR263","unstructured":"FALCON Update|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/falcon-update. Accessed 26 Feb 2023"},{"key":"4799_CR264","unstructured":"SPHINCS+ Update|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/sphincs-update. Accessed 26 Feb 2023"},{"key":"4799_CR265","unstructured":"SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/sphincsc-compressing-sphincs-with-almost-no-cost. Accessed 26 Feb 2023"},{"key":"4799_CR266","unstructured":"Classic McEliece Update|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/classic-mceliece-update. Accessed 26 Feb 2023"},{"key":"4799_CR267","unstructured":"BIKE Update|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/bike-update. Accessed 26 Feb 2023"},{"key":"4799_CR268","unstructured":"HQC Update|CSRC\u2014csrc.nist.gov. https:\/\/csrc.nist.gov\/Presentations\/2022\/hqc-update. Accessed 26 Feb 2023"},{"key":"4799_CR269","doi-asserted-by":"crossref","unstructured":"Galbraith, S.D., Petit, C., Shani, B., Ti, Y.B.: On the security of supersingular isogeny cryptosystems. In: Advances in Cryptology\u2013ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4\u20138, 2016, Proceedings, Part I 22, pp. 63\u201391. Springer (2016)","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"4799_CR270","doi-asserted-by":"crossref","unstructured":"Petit, C.: Faster algorithms for isogeny problems using torsion point images. In: Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II 23, pp. 330\u2013353. Springer (2017)","DOI":"10.1007\/978-3-319-70697-9_12"},{"key":"4799_CR271","doi-asserted-by":"crossref","unstructured":"Quehen, V., Kutas, P., Leonardi, C., Martindale, C., Panny, L., Petit, C., Stange, K.E.: Improved torsion-point attacks on sidh variants. In: Advances in Cryptology\u2013CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16\u201320, 2021, Proceedings, Part III 41, pp. 432\u2013470. Springer (2021)","DOI":"10.1007\/978-3-030-84252-9_15"},{"key":"4799_CR272","doi-asserted-by":"crossref","unstructured":"Fouotsa, T.B., Petit, C.: A new adaptive attack on sidh. In: Topics in Cryptology\u2013CT-RSA 2022: Cryptographers\u2019 Track at the RSA Conference 2022, Virtual Event, March 1\u20132, 2022, Proceedings, pp. 322\u2013344. Springer (2022)","DOI":"10.1007\/978-3-030-95312-6_14"},{"key":"4799_CR273","unstructured":"Moriya, T.: Masked-degree SIDH. Cryptology ePrint Archive, Paper 2022\/1019 (2022). https:\/\/eprint.iacr.org\/2022\/1019"},{"key":"4799_CR274","unstructured":"Fouotsa, T.B.: SIDH with masked torsion point images. Cryptology ePrint Archive, Paper 2022\/1054 (2022). https:\/\/eprint.iacr.org\/2022\/1054"},{"issue":"1","key":"4799_CR275","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-015-1195-6","volume":"15","author":"F Yan","year":"2016","unstructured":"Yan, F., Iliyasu, A.M., Venegas-Andraca, S.E.: A survey of quantum image representations. Quantum Inf. Process. 15(1), 1\u201335 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"4799_CR276","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1707-7","volume":"16","author":"C-C Mao","year":"2017","unstructured":"Mao, C.-C., Li, J., Zhu, J.-R., Zhang, C.-M., Wang, Q.: An improved proposal on the practical quantum key distribution with biased basis. Quantum Inf. Process. 16(10), 1\u201310 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"4799_CR277","first-page":"1","volume":"9","author":"S Sciancalepore","year":"2016","unstructured":"Sciancalepore, S., Piro, G., Boggia, G., Bianchi, G.: Public key authentication and key agreement in iot devices with minimal airtime consumption. IEEE Embed. Syst. Lett. 9(1), 1\u20134 (2016)","journal-title":"IEEE Embed. Syst. Lett."},{"issue":"10","key":"4799_CR278","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1109\/JPROC.2015.2466548","volume":"103","author":"A Mukherjee","year":"2015","unstructured":"Mukherjee, A.: Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proc. IEEE 103(10), 1747\u20131761 (2015)","journal-title":"Proc. IEEE"},{"key":"4799_CR279","doi-asserted-by":"crossref","unstructured":"Kumari, S., Singh, M., Singh, R., Tewari, H.: Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices: a comprehensive survey. Softw.: Pract. Exp. 52(10), 2047\u20132076 (2022)","DOI":"10.1002\/spe.3121"},{"issue":"3","key":"4799_CR280","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s41650-018-0022-5","volume":"3","author":"A Lohachab","year":"2018","unstructured":"Lohachab, A., Karambir, B.: Critical analysis of ddos-an emerging security threat over iot networks. J. Commun. Inf. Netw. 3(3), 57\u201378 (2018)","journal-title":"J. Commun. Inf. Netw."},{"key":"4799_CR281","doi-asserted-by":"crossref","unstructured":"Mehic, M., Michalek, L., Dervisevic, E., Burdiak, P., Plakalovic, M., Rozhon, J., Mahovac, N., Richter, F., Kaljic, E., Lauterbach, F., et al.: Quantum cryptography in 5g networks: a comprehensive overview. IEEE Commun. Surv. Tutor. (2023)","DOI":"10.1109\/COMST.2023.3309051"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04799-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04799-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04799-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T09:28:58Z","timestamp":1743499738000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04799-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":281,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["4799"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04799-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"7 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest among the authors or with anyone.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"93"}}