{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:05:01Z","timestamp":1735585501543,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/gcwkshps52748.2021.9681952","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T16:06:05Z","timestamp":1643040365000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["DTLS with Post-quantum Secure Source Authentication and Message Integrity"],"prefix":"10.1109","author":[{"given":"Simpy","family":"Parveen","sequence":"first","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Kneppers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"101","article-title":"Rfc 6347: Datagram transport layer security version 1.2","volume":"13","author":"rescorla","year":"2012","journal-title":"Internet Engineering Task Force"},{"year":"2019","key":"ref11","article-title":"Partnering with industry for 5g security assurance"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329837"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_8"},{"journal-title":"tinydtls Eclipse foundations","year":"2017","author":"bergmann","key":"ref15"},{"key":"ref16","volume":"11","author":"kothmayr","year":"2013","journal-title":"DTLS based Security and Two-Way Authentication for the Internet of Things"},{"journal-title":"Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)","year":"0","key":"ref17"},{"key":"ref18","volume":"5","author":"perrig","year":"2002","journal-title":"The tesla broadcast authentication protocol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72536-9_8"},{"journal-title":"NSA plans for a post-quantum world","year":"2015","key":"ref4"},{"article-title":"Dtls with post-quantum secure source authentication and message integrity","year":"2021","author":"simpy","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref6","article-title":"Status report on the second round of the nist post-quantum cryptography standardization process","author":"alagic","year":"2020","journal-title":"US Department of Commerce NIST SP"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref8","first-page":"14","article-title":"Post-quantum key exchange for the internet and the open quantum safe project","author":"stebila","year":"2016","journal-title":"International Conference on Selected Areas in Cryptography"},{"journal-title":"Introducing CIRCL An Advanced Cryptographic Library","year":"2019","author":"kris kwiatkowski","key":"ref7"},{"article-title":"Rfc2401: Security architecture for the internet protocol","year":"1998","author":"kent","key":"ref2"},{"journal-title":"White Paper for An introduction benefits enablers and challenges","article-title":"Quantum safe cryptography and security","year":"2015","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4347"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24203"},{"key":"ref22","article-title":"Hybrid post-quantum key encapsulation methods (pq kem) for transport layer security 1.2 (tls)","volume":"1","author":"campagna","year":"2019","journal-title":"Internet Engineering Task Force Internet-Draft draft-campagna-tls-bike-sike-hybrid"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.B3799.129219"},{"key":"ref24","first-page":"858","article-title":"Prototyping post-quantum and hybrid key exchange and authentication in tls and ssh","volume":"2019","author":"crockett","year":"2019","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref23","article-title":"Quantum-safe hybrid (qsh) ciphersuite for transport layer security (tls) version 1.3","author":"schanck","year":"2016","journal-title":"IETF Internet-Draft draft-whyte-qsh-tls"},{"key":"ref26","article-title":"Dtls with post quantum security for origin authentication and integrity","author":"parveen","year":"2020","journal-title":"Master&#x2019;s of Science Thesis"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_24"}],"event":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2021,12,7]]},"location":"Madrid, Spain","end":{"date-parts":[[2021,12,11]]}},"container-title":["2021 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9681915\/9681831\/09681952.pdf?arnumber=9681952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:57:53Z","timestamp":1652187473000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9681952\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps52748.2021.9681952","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}