{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:43:45Z","timestamp":1778611425683,"version":"3.51.4"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Ministry of Higher Education Malaysia for funding this research"},{"name":"Fundamental Research Grant Scheme"},{"DOI":"10.13039\/100031258","name":"UCSI University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100031258","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Top. Appl. Earth Observations Remote Sensing"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/jstars.2025.3540905","type":"journal-article","created":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T13:26:28Z","timestamp":1739280388000},"page":"7876-7891","source":"Crossref","is-referenced-by-count":27,"title":["A Novel Hybrid Quantum-Crypto Standard to Enhance Security and Resilience in 6G-Enabled IoT Networks"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8643-9246","authenticated-orcid":false,"given":"Kranthi Kumar","family":"Singamaneni","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Symbiosis Institute of Technology, Hyderabad campus &amp; Symbiosis International University, Pune, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5118-2284","authenticated-orcid":false,"given":"Anil Kumar","family":"Budati","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Koneru Lakshmaiah Education Foundation, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0490-7799","authenticated-orcid":false,"given":"Shayla","family":"Islam","sequence":"additional","affiliation":[{"name":"Institute of Computer Science and Digital Innovation, UCSI University, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6712-0459","authenticated-orcid":false,"given":"Raenu A. L.","family":"Kolandaisamy","sequence":"additional","affiliation":[{"name":"Institute of Computer Science and Digital Innovation, UCSI University, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9781-3969","authenticated-orcid":false,"given":"Ghulam","family":"Muhammad","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering,College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2021.3057679"},{"key":"ref2","article-title":"Some attacks on quantum-based cryptographic protocols","author":"Lo","year":"2003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090354"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109526"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-10-8201-6_1","article-title":"DDoS attacksAnalysis and prevention","volume-title":"Innovations in Computer Science and Engineering","volume":"32","author":"Dayanandam","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2414-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.03.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.51594\/csitrj.v5i2.790"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-024-10122-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2900631"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref16","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","volume-title":"Proc. Public Key Cryptogr.","volume":"6571","author":"Waters","year":"2011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.026"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.015"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.136"},{"key":"ref23","article-title":"Ciphertext policy attribute based encryption with efficient revocation","author":"Liang","year":"2010"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2931156"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.01.035"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2523941"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","article-title":"Fuzzy identity-based encryption","volume-title":"Proc. Adv. Cryptol.EUROCRYPT 2005","author":"Sahai","year":"2005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513004"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-9383-0","volume-title":"Identity-Based Encryption","author":"Chatterjee","year":"2011"},{"key":"ref32","first-page":"368","article-title":"New constructions of fuzzy identity-based encryption","volume-title":"Proc. 2nd ACM Symp. Inf., Comput. Commun. Secur.","author":"Baek","year":"2009"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/978-3-642-02295-1_11","article-title":"Practical lattice-based cryptography: NTRUEncrypt and NTRUSign","volume-title":"The LLL Algorithm: Survey and Applications","author":"Hoffstein","year":"2009"},{"key":"ref34","first-page":"3","article-title":"Choosing parameters for NTRUEncrypt","volume-title":"Proc. Cryptographers Track RSA Conf.","author":"Hoffstein","year":"2017"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2016.1226650"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/3659997.3660033","article-title":"Exploring post quantum cryptography with quantum key distribution for sustainable mobile network architecture design","volume-title":"Proc. 4th Workshop Perform. Energy Efficiency Concurrent Distrib. Syst.","author":"Hoque","year":"2024"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.019"},{"key":"ref38","article-title":"Secure two-party computation approach for NTRUEncrypt","author":"You","year":"2022"},{"key":"ref39","first-page":"565","article-title":"Decryption failure attacks on IND-CCA secure lattice-based schemes","volume-title":"Proc. 22nd IACR Int. Conf. Pract. Theory Public-Key Cryptogr.","author":"D\u2019Anvers","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3299172"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0089-z"},{"key":"ref43","article-title":"NTRU software implementation for constrained devices","author":"Giacomino","year":"2008"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-030-25510-7_2","article-title":"Evaluating the potential for hardware acceleration of four NTRU-based key encapsulation mechanisms using software\/hardware codesign","volume-title":"Proc. 10th Int. Conf. Post-Quantum Cryptogr.","author":"Farahmand","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_14"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i2.240-265"},{"key":"ref47","first-page":"164","article-title":"Post-quantum encryption scheme with supersingular isogenies","volume-title":"Proc. 14th Int. Sci. Conf. INTERAGROMASH 2021\" Precis. Agriculture Agricultural Machinery Ind.","volume":"1","author":"Lyashenko","year":"2021"},{"key":"ref48","article-title":"A usability study of post-quantum algorithms","author":"Kindberg","year":"2017"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1742386"},{"issue":"2","key":"ref50","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1631\/FITEE.1500197","article-title":"Efficient identity-based signature over NTRU lattice","volume":"17","author":"Xie","year":"2016","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2024.3419791"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s12145-024-01292-9"}],"container-title":["IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4609443\/10766875\/10882923.pdf?arnumber=10882923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:58:07Z","timestamp":1771966687000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10882923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/jstars.2025.3540905","relation":{},"ISSN":["1939-1404","2151-1535"],"issn-type":[{"value":"1939-1404","type":"print"},{"value":"2151-1535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}