{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:24Z","timestamp":1756273224891,"version":"3.44.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130165","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"944-949","source":"Crossref","is-referenced-by-count":0,"title":["Fortified Control-Plane Encapsulation with Session-Key Derivation for Secure IP Mesh Routing"],"prefix":"10.1109","author":[{"given":"George","family":"Amponis","sequence":"first","affiliation":[{"name":"Democritus University of Thrace,K3Y Ltd.,Sofia,Bulgaria"}]},{"given":"Panagiotis","family":"Radoglou-Grammatikis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia,K3Y Ltd.,Sofia,Bulgaria"}]},{"given":"Thomas","family":"Lagkas","sequence":"additional","affiliation":[{"name":"Democritus University of Thrace,Dept. of Informatics,Kavala,Greece"}]},{"given":"Vasileios","family":"Argyriou","sequence":"additional","affiliation":[{"name":"Kingston University,Dept. of Networks &#x0026; Digital Media,London,UK"}]},{"given":"Antonios","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"K3Y Ltd.,Sofia,Bulgaria"}]},{"given":"Natasa","family":"Kazakli","sequence":"additional","affiliation":[{"name":"MetaMind Innovations P.C.,Thessaloniki,Greece"}]},{"given":"Thomas","family":"Boufikos","sequence":"additional","affiliation":[{"name":"K3Y Ltd.,Sofia,Bulgaria"}]},{"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia,Dept. of Electrical and Computer Eng.,Kozani,Greece"}]}],"member":"263","reference":[{"key":"ref1","first-page":"3626","article-title":"Optimized Link State Routing Protocol (OLSR)","author":"Clausen","year":"2003","journal-title":"IETF, RFC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.1994.365700"},{"key":"ref3","article-title":"CRYSTALS-Kyber Specification Version 3.02","volume-title":"CRYSTALS Consortium, Tech. Rep","author":"Avanzi","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8439"},{"article-title":"liboqs-C Library for Post-Quantum Cryptography","year":"2024","author":"Quantum","key":"ref5"},{"article-title":"OpenSSL Cryptography and SSL\/TLS Toolkit","year":"2024","author":"Project","key":"ref6"},{"year":"2024","key":"ref7","article-title":"Post-Quantum Cryptography"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/elconrus51938.2021.9396513"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/milcom61039.2024.10773852"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iscon52037.2021.9702489"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14040728"},{"key":"ref12","article-title":"Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design","author":"Hoque","year":"2024","journal-title":"arXiv preprint arXiv:2404.10602"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs60910.2024.00116"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/iccc62609.2024.10941900"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/iccre49379.2020.9096471"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2024.101685"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5869"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/iccsc62048.2024.10830299"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130165.pdf?arnumber=11130165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:05:05Z","timestamp":1756271105000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130165","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}