{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:26:36Z","timestamp":1771025196966,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,25]]},"DOI":"10.1109\/icecet61485.2024.10698231","type":"proceedings-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T17:33:15Z","timestamp":1728408795000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["dOISP: Rapidly Deployable Quantum-Resistant, Fully Decentralized Layer 3 Authentication and Encryption for True Zero-Trust Networking in Disparate Complex Networks"],"prefix":"10.1109","author":[{"given":"Christopher Patrick","family":"Autry","sequence":"first","affiliation":[{"name":"Iothic, Ltd., The University of Oxford Washington,DC,USA"}]},{"given":"Wayne","family":"Henderson","sequence":"additional","affiliation":[{"name":"Iothic, Ltd.,Oxford,The United Kingdom"}]},{"given":"Mykhailo","family":"Magal","sequence":"additional","affiliation":[{"name":"Iothic, Ltd,Toronto,Canada"}]},{"given":"Andrew William","family":"Roscoe","sequence":"additional","affiliation":[{"name":"The University of Oxford, Iothic, Ltd,Oxford,The United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.51594\/csitrj.v5i2.758"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC53980.2022.9896970"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174679"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME55909.2022.9988136"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEM51511.2021.9445307"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102436"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1964\/4\/042002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1089-9"},{"key":"ref10","first-page":"800","article-title":"National Institute of Standards and Technology Special Publication 800\u201357 Part 1, Revision 5 Natl","year":"2020","journal-title":"Inst. Stand. Technol. Spec. Publ."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME55909.2022.9988136"},{"key":"ref12","article-title":"SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, Federal Inf. Process. Stds. (NIST FIPS)","volume-title":"National Institute of Standards and Technology, Gaithersburg","author":"Dworkin","year":"2015"},{"issue":"1","key":"ref13","first-page":"11","article-title":"Advanced encryption standard (AES) algorithm to encrypt and decrypt data","volume":"16","author":"Abdullah","year":"2017","journal-title":"Cryptography and Network Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"issue":"2","key":"ref15","article-title":"Achieving Data Authentication With HmacSha256 Algorithm","volume":"54","author":"Azeez","year":"2018","journal-title":"Computer Science & Telecommunications"}],"event":{"name":"2024 International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Sydney, Australia","start":{"date-parts":[[2024,7,25]]},"end":{"date-parts":[[2024,7,27]]}},"container-title":["2024 International Conference on Electrical, Computer and Energy Technologies (ICECET"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10697983\/10697986\/10698231.pdf?arnumber=10698231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T05:58:03Z","timestamp":1728453483000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10698231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,25]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icecet61485.2024.10698231","relation":{},"subject":[],"published":{"date-parts":[[2024,7,25]]}}}