{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T19:13:03Z","timestamp":1769800383972,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,14]]},"DOI":"10.1109\/comcomap68359.2025.11353153","type":"proceedings-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:19:25Z","timestamp":1769721565000},"page":"228-235","source":"Crossref","is-referenced-by-count":0,"title":["Post-Quantum Secure Lattice-Based Authentication Scheme for IoT-Enabled Contactless Smart Payments"],"prefix":"10.1109","author":[{"given":"Abhishek Kumar","family":"Pandey","sequence":"first","affiliation":[{"name":"International Institute of Information Technology,Center for Security, Theory and Algorithmic Research,Hyderabad,India,500 032"}]},{"given":"Prithwi","family":"Bagchi","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology,Center for Security, Theory and Algorithmic Research,Hyderabad,India,500 032"}]},{"given":"Debnath","family":"Ghosh","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology,Center for Security, Theory and Algorithmic Research,Hyderabad,India,500 032"}]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology,Center for Security, Theory and Algorithmic Research,Hyderabad,India,500 032"}]},{"given":"Ravi Kumar","family":"Kappagantu","sequence":"additional","affiliation":[{"name":"Lloyds Technology Centre,Hyderabad,India,500 081"}]},{"given":"Srinivas V","family":"Katakam","sequence":"additional","affiliation":[{"name":"Lloyds Technology Centre,Hyderabad,India,500 081"}]},{"given":"Jitendra","family":"Chougala","sequence":"additional","affiliation":[{"name":"Lloyds Technology Centre,Hyderabad,India,500 081"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s24237423"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7448560"},{"key":"ref3","article-title":"Ngate android malware relays nfc traffic to steal cash","author":"Stefanko","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01242-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.62056\/ahee0iuc"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3549720"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_24"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2439964"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_169"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2025.3605524"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1006-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0321-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3091163"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2024.123378"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCSS60660.2024.10625350"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2020100108"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2668389"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06270-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3553044"}],"event":{"name":"2025 Computing, Communications and IoT Applications (ComComAp)","location":"Madrid, Spain","start":{"date-parts":[[2025,12,14]]},"end":{"date-parts":[[2025,12,17]]}},"container-title":["2025 Computing, Communications and IoT Applications (ComComAp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11353105\/11353106\/11353153.pdf?arnumber=11353153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:35:21Z","timestamp":1769758521000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11353153\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/comcomap68359.2025.11353153","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]}}}