{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:28:01Z","timestamp":1775312881681,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Research Foundation of Korea (NRF) Grant for Regional Leading Research Center (RLRC) by the Korean Government through the Ministry of Science and ICT","award":["2022R1A5A-8026986"],"award-info":[{"award-number":["2022R1A5A-8026986"]}]},{"name":"MSIT, South Korea, under the Grand Information Technology Research Center Support Program (Grand-ICT) supervised by the Institute for Information and Communications Technology Planning and Evaluation","award":["IITP-2023-2020-0-01462"],"award-info":[{"award-number":["IITP-2023-2020-0-01462"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/jiot.2025.3618153","type":"journal-article","created":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T17:37:59Z","timestamp":1759772279000},"page":"53704-53729","source":"Crossref","is-referenced-by-count":1,"title":["PQ-V2X: A Novel Postquantum Cryptographic Dataset for Secure Vehicular Communications"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8945-8664","authenticated-orcid":false,"given":"Shimaa A.","family":"Abdel Hakeem","sequence":"first","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2602-2075","authenticated-orcid":false,"given":"HyungWon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, Chungbuk National University, Cheongju, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2025.3558849"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8413-upd1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104726"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01701-9_18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/15501477211000287"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07635-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264479"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514157"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100198"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.09.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8797-4_21"},{"key":"ref13","volume-title":"CSE-CIC-IDS2018 Dataset"},{"key":"ref14","article-title":"X-IIoTID: A connectivity- and device-agnostic intrusion dataset for industrial Internet of Things","volume-title":"IEEE Dataport","author":"Al-Hawawreh","year":"2021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.62.1805"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40986-1"},{"key":"ref17","volume-title":"UNSW-NB15 Dataset","year":"2024"},{"key":"ref18","article-title":"ROAD: The real ORNL automotive dynamometer controller area network intrusion detection dataset (with a comprehensive CAN IDS dataset survey & guide)","author":"Verma","year":"2020","journal-title":"arXiv:2012.14600"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3037899"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT61902.2024.10673280"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2020.2987430"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2797529"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3252082"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2972923"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3091163"},{"issue":"2","key":"ref26","first-page":"1739","article-title":"AAKE-BIVT: Anonymous authenticated key exchange for blockchain-IoV","volume":"24","author":"Badshah","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3571307"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3421381"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT61001.2024.10723837"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3552830"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/VNC57357.2023.10136335"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2025.3567439"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3528562"},{"key":"ref34","volume-title":"Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project","author":"Stebila","year":"2016"},{"key":"ref35","volume-title":"Post-Quantum Cryptography Standardization Project","author":"National Institute of Standards","year":"2025"},{"key":"ref36","volume-title":"Recommendation for the Entropy Sources Used for Random Bit Generation","author":"National Institute of Standards","year":"2018"},{"key":"ref37","volume-title":"Liboqs: C Library for Quantum-Safe Cryptography","year":"2023"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11293846\/11193862.pdf?arnumber=11193862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T18:47:15Z","timestamp":1765478835000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11193862\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":37,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3618153","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,15]]}}}