{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T21:29:06Z","timestamp":1772054946997,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"HORIZON EUROPE Framework Programme, project LAZARUS","award":["101070303"],"award-info":[{"award-number":["101070303"]}]},{"name":"EU-NGEU NRRP MUR Program, SERICS Project","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656115","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T19:25:07Z","timestamp":1716233107000},"page":"174-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8192-5117","authenticated-orcid":false,"given":"Tommaso","family":"Bianchi","sequence":"first","affiliation":[{"name":"University of Padova, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6138-2995","authenticated-orcid":false,"given":"Alessandro","family":"Brighente","sequence":"additional","affiliation":[{"name":"University of Padova, Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padova &amp; Delft University of Technology, Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Surudhi Asokraj Tommaso Bianchi Alessandro Brighente Mauro Conti and Radha Poovendran. 2022. Identity-Based Authentication for On-Demand Charging of Electric Vehicles. arXiv:2208.02857 [cs.CR]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3116279"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.210"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3186949"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3153658"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40890-015-0005-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Spring57618.2023.10199651"},{"key":"e_1_3_2_1_8_1","unstructured":"Joseph Birr-Pixton. 2020. Cifra. https:\/\/github.com\/ctz\/cifra [Online: accessed Sep-2023]."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704155"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/EVS.2013.6915017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_3_2_1_12_1","volume-title":"Report on post-quantum cryptography","author":"Chen Lily","unstructured":"Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray A Perlner, and Daniel Smith-Tone. 2016. Report on post-quantum cryptography. Vol. 12. US Department of Commerce, National Institute of Standards and Technology."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--540--70545--1_38"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2017.7918335"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Aaron Hula Jeffrey Alson Amy Bunker and Kevin Bolon. 2014. Analysis of technology adoption rates in new vehicles. Technical Report. SAE Technical Paper.","DOI":"10.4271\/2014-01-0781"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPEL.2014.2300978"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2018"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Surbhi Pareek A Sujil Saurabh Ratra and Rajesh Kumar. 2020. Electric Vehicle Charging Station Challenges and Opportunities: A Future Perspective. In 2020 International Conference on Emerging Trends in Communication Control and Computing (ICONC3). 1--6. https:\/\/doi.org\/10.1109\/ICONC345789.2020.9117473","DOI":"10.1109\/ICONC345789.2020.9117473"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996868"},{"key":"e_1_3_2_1_23_1","volume-title":"Henderson","author":"Riley George F.","year":"2010","unstructured":"George F. Riley and Thomas R. Henderson. 2010. The ns-3 Network Simulator. Springer Berlin Heidelberg, Berlin, Heidelberg, 15--34. https:\/\/doi.org\/10.1007\/ 978--3--642--12331--3_2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102004"},{"key":"e_1_3_2_1_25_1","volume-title":"Advances in Cryptology","author":"Shamir Adi","unstructured":"Adi Shamir. 1985. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology, George Robert Blakley and David Chaum (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 47--53."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMDC.2013.6556258"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD53832.2021.00081"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Takahito Yoshizawa and Preneel Bart. 2023. Post-Quantum Impacts on V2X Certificates -- Already at The End of The Road.","DOI":"10.1109\/VTC2023-Spring57618.2023.10199793"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"YXingwen Zhao Jiaping Lin and Hui Li. 2017. Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles. https:\/\/doi.org\/10.1155\/2017\/1325698","DOI":"10.1155\/2017\/1325698"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Seoul Republic of Korea","acronym":"WiSec '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656115","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:07Z","timestamp":1755907207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":30,"alternative-id":["10.1145\/3643833.3656115","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656115","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}