{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:53:37Z","timestamp":1773248017174,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T00:00:00Z","timestamp":1677801600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T00:00:00Z","timestamp":1677801600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100009105","name":"Ministry of Internal Affairs and Communications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100009105","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,3]]},"DOI":"10.1109\/iccae56788.2023.10111350","type":"proceedings-article","created":{"date-parts":[[2023,5,3]],"date-time":"2023-05-03T18:06:35Z","timestamp":1683137195000},"page":"551-558","source":"Crossref","is-referenced-by-count":4,"title":["A Selection Technique for Effective Utilization of Post-Quantum Cryptography in 5G Application and Beyond"],"prefix":"10.1109","author":[{"given":"Babatunde","family":"Ojetunde","sequence":"first","affiliation":[{"name":"Advanced Telecommunications Research Institute International, Seika, Soraku,Wave Engineering Laboratory,Kyoto,Japan"}]},{"given":"Takuya","family":"Kurihara","sequence":"additional","affiliation":[{"name":"Advanced Telecommunications Research Institute International, Seika, Soraku,Wave Engineering Laboratory,Kyoto,Japan"}]},{"given":"Kazuto","family":"Yano","sequence":"additional","affiliation":[{"name":"Advanced Telecommunications Research Institute International, Seika, Soraku,Wave Engineering Laboratory,Kyoto,Japan"}]},{"given":"Toshikazu","family":"Sakano","sequence":"additional","affiliation":[{"name":"Advanced Telecommunications Research Institute International, Seika, Soraku,Wave Engineering Laboratory,Kyoto,Japan"}]},{"given":"Hiroyuki","family":"Yokoyama","sequence":"additional","affiliation":[{"name":"Advanced Telecommunications Research Institute International, Seika, Soraku,Adaptive Communications Research Laboratories,Kyoto,Japan"}]}],"member":"263","reference":[{"key":"ref13","article-title":"KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip","volume":"13269","author":"g\u00fcnther","year":"2022","journal-title":"Applied Cryptography and Network Security ACNS 2022 Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_1"},{"key":"ref23","article-title":"Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems","author":"sanders","year":"2017"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-642-21004-4_7","article-title":"Intelligent Systems, A Modern Approach","volume":"17","author":"grosan","year":"2011","journal-title":"Intelligent Systems Reference Library Book Series"},{"key":"ref14","first-page":"858","article-title":"Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH","author":"eric","year":"2019","journal-title":"IACR Cryptology ePrint Archive 2019"},{"key":"ref20","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423350"},{"key":"ref22","article-title":"Wireshark User&#x2019;s Guide","author":"sharpe","year":"0","journal-title":"Version 4 1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.15.10.747-754"},{"key":"ref21","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.9.5.379-384"},{"key":"ref17","article-title":"On PQC Migration and Crypto-Agility","author":"wiesmaier","year":"2021"},{"key":"ref16","article-title":"Fine Tuning Run Parameter Values in Rule-Based Machine Learning","author":"moschoyiannis","year":"2019","journal-title":"Proc the 13th RuleML+RR 2019 Doctoral Consortium and Rule Challenge"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICEA.2019.8858305"},{"key":"ref18","article-title":"LTE physical layer framework for performance verification","year":"2007","journal-title":"Tech Rep 3GPP TSG-RAN1#48 R1-070674"},{"key":"ref8","first-page":"8413","article-title":"Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process","author":"alagic","year":"2022","journal-title":"(National Institute of Standards and Technology (NIST) ) NIST Internal Report (NISTIR)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.17.12.972-978"},{"key":"ref4","article-title":"Learn quantum computing: a field guide","author":"quantum","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref6","article-title":"Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms","author":"barker","year":"2021","journal-title":"(National Institute of Standards and Technology (NIST) ) NIST Cybersecurity White Paper"},{"key":"ref5","article-title":"Shor&#x2019;s Quantum Factoring Algorithm","author":"craig","year":"0","journal-title":"Algorithmic Assertions"}],"event":{"name":"2023 15th International Conference on Computer and Automation Engineering (ICCAE)","location":"Sydney, Australia","start":{"date-parts":[[2023,3,3]]},"end":{"date-parts":[[2023,3,5]]}},"container-title":["2023 15th International Conference on Computer and Automation Engineering (ICCAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10111091\/10111098\/10111350.pdf?arnumber=10111350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T17:41:27Z","timestamp":1684777287000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10111350\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccae56788.2023.10111350","relation":{},"subject":[],"published":{"date-parts":[[2023,3,3]]}}}