{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:23:23Z","timestamp":1776075803017,"version":"3.50.1"},"reference-count":84,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062966","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T04:59:39Z","timestamp":1747717179000},"page":"25-55","source":"Crossref","is-referenced-by-count":3,"title":["Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions"],"prefix":"10.32604","volume":"84","author":[{"given":"Seo Yeon","family":"Moon","sequence":"first","affiliation":[]},{"given":"Byung Hyun","family":"Jo","sequence":"additional","affiliation":[]},{"given":"Abir El","family":"Azzaoui","sequence":"additional","affiliation":[]},{"given":"Sushil Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"3001","DOI":"10.3390\/s21093001","article-title":"Edge\/fog computing technologies for IoT infrastructure","volume":"21","author":"Kim","year":"2021","journal-title":"Sensors"},{"key":"ref2","first-page":"25","article-title":"Dynamic logical resource reconstruction against straggler problem in edge federated learning","volume":"14","author":"Li","year":"2024","journal-title":"Hum Centric Comput Inf Sci"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1788","DOI":"10.3390\/s19081788","article-title":"The security of big data in fog-enabled IoT applications including blockchain: a survey","volume":"19","author":"Tariq","year":"2019","journal-title":"Sensors"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","article-title":"A survey on the edge computing for the Internet of Things","volume":"6","author":"Yu","year":"2017","journal-title":"IEEE Access"},{"key":"ref5","first-page":"1","article-title":"Visual Servo Image real-time processing system based on fog computing","volume":"13","author":"Wang","year":"2023","journal-title":"Hum-Centric Comput Inf Sci"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","article-title":"All one needs to know about fog computing and related edge computing paradigms: a complete survey","volume":"98","author":"Yousefpour","year":"2019","journal-title":"J Syst Archit"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"927","DOI":"10.3390\/s22030927","article-title":"A survey of security in cloud, edge, and fog computing","volume":"22","author":"Ometov","year":"2022","journal-title":"Sensors"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"8226","DOI":"10.3390\/s21248226","article-title":"An overview of fog computing and edge computing security and privacy issues","volume":"21","author":"Alwakeel","year":"2021","journal-title":"Sensors"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1186\/s13673-019-0188-3","article-title":"TACRM: trust access control and resource management mechanism in fog computing","volume":"9","author":"Ben Daoud","year":"2019","journal-title":"Hum Centric Comput Inf Sci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"78","DOI":"10.12720\/jcm.19.2.78-89","article-title":"Internet of things: security, issues, threats, and assessment of different cryptographic technologies","volume":"19","author":"Raeisi-Varzaneh","year":"2024","journal-title":"J Commun"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"329","DOI":"10.32604\/cmc.2023.043439","article-title":"Enhancing IoT security: quantum-level resilience against threats","volume":"78","author":"Alhakami","year":"2024","journal-title":"Comput Mater Continua"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1080\/23335777.2020.1811384","article-title":"Leveraging the power of quantum computing for breaking RSA encryption","volume":"7","author":"Sharma","year":"2021","journal-title":"Cyber Phys Syst"},{"key":"ref13","series-title":"Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security","article-title":"From pre-quantum to post-quantum RSA","author":"Joshi","year":"2023 May 24\u201326"},{"key":"ref14","unstructured":"Liu T, Ramachandran G, Jurdak R. Post-quantum cryptography for Internet of Things: a survey on performance and optimization. arXiv:2401.17538v1. 2024."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"6457","DOI":"10.1109\/JIOT.2019.2958788","article-title":"From pre-quantum to post-quantum IoT security: a survey on quantum-resistant cryptosystems for the Internet of Things","volume":"7","author":"Fern\u00e1ndez-Caram\u00e9s","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref16","first-page":"1","article-title":"A comprehensive study on quantum computing technologies in smart city: review and future directions","volume":"14","author":"EL Azzaoui","year":"2024","journal-title":"Hum-Centric Comput Inf Sci"},{"key":"ref17","series-title":"Proceedings of the 2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI)","article-title":"Lattice-based cryptography for IoT in a quantum world: are we ready?","author":"Khalid","year":"2019 Jun 13\u201314"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1575","DOI":"10.3390\/electronics13081575","article-title":"Design and evaluation of device authentication and secure communication system with PQC for AIoT environments","volume":"13","author":"Chen","year":"2024","journal-title":"Electronics"},{"key":"ref19","series-title":"Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services","article-title":"When post-quantum cryptography meets the Internet of Things: an empirical study","author":"Chung","year":"2022 Jun 27\u2013Jul 1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"6284","DOI":"10.3390\/s22166284","article-title":"Quantum key distribution: modeling and simulation through BB84 protocol using Python3","volume":"22","author":"Adu-Kyere","year":"2022","journal-title":"Sensors"},{"key":"ref21","series-title":"Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing","article-title":"Quantum cryptography: public key distribution and coin tossing","author":"Bennett","year":"1984 Dec 9\u201312"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"101132","DOI":"10.1016\/j.iot.2024.101132","article-title":"Securing IoT systems in a post-quantum environment: vulnerabilities, attacks, and possible solutions","volume":"25","author":"Alomari","year":"2024","journal-title":"Internet Things"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"40","DOI":"10.3390\/cryptography7030040","article-title":"A survey of post-quantum cryptography: start of a new race","volume":"7","author":"Dam","year":"2023","journal-title":"Cryptography"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","article-title":"Transitioning organizations to post-quantum cryptography","volume":"605","author":"Joseph","year":"2022","journal-title":"Nature"},{"key":"ref25","series-title":"Proceedings of the 2023 International Conference on Information Networking (ICOIN)","article-title":"Post quantum cryptography: a review of techniques, challenges and standardizations","author":"Bavdekar","year":"2023 Jan 11\u201314"},{"key":"ref26","series-title":"Proceedings of the 2020 IEEE High Performance Extreme Computing Conference (HPEC)","article-title":"Post quantum cryptography (PQC)\u2014an overview","author":"Kumar","year":"2020 Sep 22\u201324"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3292674","article-title":"A survey of communication protocols for Internet of Things and related challenges of fog and cloud computing integration","volume":"51","author":"Dizdarevi\u0107","year":"2019","journal-title":"ACM Comput Surv"},{"key":"ref28","series-title":"Proceedings of the International Conference on Machine Learning Algorithms 2024","article-title":"Comprehensive exploration of IoT communication protocol: coap, MQTT, HTTP, LoRaWAN and AMQP","author":"Lalhriatpuii","year":"2024 Feb 22\u201323"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"848","DOI":"10.3390\/app9050848","article-title":"Vulnerabilities and limitations of MQTT protocol used between IoT devices","volume":"9","author":"Dinculean\u0103","year":"2019","journal-title":"Appl Sci"},{"key":"ref30","series-title":"Proceedings of the 2020 IEEE International Conference on Smart Cloud (SmartCloud)","article-title":"A review on the study on MQTT security challenge","author":"Chen","year":"2020 Nov 6\u20138"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1007\/s12652-018-0729-z","article-title":"Analysis of CoAP implementations for industrial Internet of Things: a survey","volume":"10","author":"Iglesias-Urkia","year":"2019","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref32","series-title":"Proceedings of the 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","article-title":"An overview of security in CoAP: attack and analysis","author":"Arvind","year":"2019 Mar 15\u201316"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.3390\/electronics9081320","article-title":"CoAP-based streaming control for IoT applications","volume":"9","author":"Jung","year":"2020","journal-title":"Electronics"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"94880","DOI":"10.1109\/ACCESS.2020.2993363","article-title":"Investigating messaging protocols for the Internet of Things (IoT)","volume":"8","author":"Al-Masri","year":"2020","journal-title":"IEEE Access"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"66","DOI":"10.3390\/fi11030066","article-title":"Communication protocols of an industrial Internet of Things environment: a comparative study","volume":"11","author":"Jaloudi","year":"2019","journal-title":"Future Internet"},{"key":"ref36","first-page":"90","article-title":"Overview and comparison of protocols Internet of Things: mQTT and AMQP","volume":"10","author":"Yakupov","year":"2022","journal-title":"Int J Open Inf Technol"},{"key":"ref37","series-title":"Proceedings of the 2019 IEEE Fourth Ecuador Technical Chapters Meeting (ETCM)","article-title":"Industrial shop-floor integration based on AMQP protocol in an IoT environment","author":"Caiza","year":"2019 Nov 11\u201315"},{"key":"ref38","series-title":"Proceedings of the 2019 6th NAFOSTED Conference on Information and Computer Science (NICS)","article-title":"A comparison of AMQP and MQTT protocols for Internet of Things","author":"Uy","year":"2019 Dec 12\u201313"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"100791","DOI":"10.1016\/j.iot.2023.100791","article-title":"IoT Zigbee device security: a comprehensive review","volume":"22","author":"Zohourian","year":"2023","journal-title":"Internet Things"},{"key":"ref40","series-title":"Proceedings of the 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","article-title":"An overview of practical attacks on BLE based IOT devices and their security","author":"Pallavi","year":"2019 Mar 15\u201316"},{"key":"ref41","series-title":"Proceedings of the 2019 10th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES)","article-title":"A multi-protocol IoT gateway and WiFi\/BLE sensor nodes for smart home and building automation: design and implementation","author":"Khanchuea","year":"2019 Mar 25\u201327"},{"key":"ref42","series-title":"Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT)","article-title":"Indoor positioning system for IoT device based on BLE technology and MQTT protocol","author":"Mekki","year":"2019 Apr 15\u201318"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.comcom.2020.10.009","article-title":"A study of LoRaWAN protocol performance for IoT applications in smart agriculture","volume":"164","author":"Miles","year":"2020","journal-title":"Comput Commun"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"648","DOI":"10.3390\/s20030648","article-title":"LoRaWAN for smart city IoT deployments: a long term evaluation","volume":"20","author":"Basford","year":"2020","journal-title":"Sensors"},{"key":"ref45","series-title":"Proceedings of the 2023 15th IEEE International Conference on Industry Applications (INDUSCON)","article-title":"A survey on OPC UA protocol: overview, challenges and opportunities","author":"Da Silva","year":"2023 Nov 22\u201324"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"4879","DOI":"10.3390\/app11114879","article-title":"A performance analysis of Internet of Things networking protocols: evaluating MQTT, CoAP, OPC UA","volume":"11","author":"Silva","year":"2021","journal-title":"Appl Sci"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"7760","DOI":"10.3390\/s21227760","article-title":"DDS and OPC UA protocol coexistence solution in real-time and industry 4.0 context using non-ideal infrastructure","volume":"21","author":"Ioana","year":"2021","journal-title":"Sensors"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1049\/iet-com.2019.0608","article-title":"DDS-based protocol-compatible communication platform for mining power system","volume":"14","author":"Fang","year":"2020","journal-title":"IET Commun"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.3390\/electronics11132096","article-title":"Implementation of DDS cloud platform for real-time data acquisition of sensors for a legacy machine","volume":"11","author":"Ho","year":"2022","journal-title":"Electronics"},{"key":"ref50","series-title":"Proceedings of the 2020 9th IFIP International Conference on Performance Evaluation and Modeling in Wireless Networks (PEMWN)","article-title":"Low-power IoT communication security: on the performance of DTLS and TLS 1.3","author":"Restuccia","year":"2020 Dec 1\u20133"},{"key":"ref51","series-title":"Proceedings of the 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)","article-title":"Advanced secure architecture for the Internet of Things based on DTLS protocol","author":"Abdulelah","year":"2020 Oct 22\u201324"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"e200","DOI":"10.1002\/spy2.200","article-title":"Securing the future Internet of Things with post-quantum cryptography","volume":"5","author":"Kumar","year":"2022","journal-title":"Security Priv"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"12204","DOI":"10.1109\/JIOT.2023.3245360","article-title":"Nested hash access with post quantum encryption for mission-critical IoT communications","volume":"10","author":"Xu","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"e0279429","DOI":"10.1371\/journal.pone.0279429","article-title":"Post quantum blockchain architecture for Internet of Things over NTRU lattice","volume":"18","author":"Yuan","year":"2023","journal-title":"PLoS One"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1109\/TNSE.2021.3095192","article-title":"Secure social Internet of Things based on post-quantum blockchain","volume":"9","author":"Yi","year":"2022","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref56","series-title":"Proceedings of the 2024 IEEE Symposium on Computers and Communications (ISCC)","article-title":"Integrating post-quantum cryptography into CoAP and MQTT-SN protocols","author":"Blanco-Romero","year":"2024 Jun 26\u201329"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"416","DOI":"10.3390\/jcp3030021","article-title":"Post-quantum authentication in the MQTT protocol","volume":"3","author":"Samandari","year":"2023","journal-title":"J Cybersecur Priv"},{"key":"ref58","series-title":"Proceedings of the 2023 Symposium on Internet of Things (SIoT)","article-title":"Assessment of the impact of hybrid post-quantum cryptography on the performance of the MQTT communication protocol","author":"Jos\u00e9 Aguiar Rampazzo","year":"2023 Oct 25\u201327"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1109\/TII.2024.3485796","article-title":"Integrating post-quantum cryptography and blockchain to secure low-cost IoT devices","volume":"21","author":"Castiglione","year":"2025","journal-title":"IEEE Trans Ind Inf"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"130","DOI":"10.46586\/tches.v2024.i2.130-153","article-title":"A highly-efficient lattice-based post-quantum cryptography processor for IoT applications","volume":"2024","author":"Ye","year":"2024","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/MWC.012.2200289","article-title":"Information-theoretic secure key sharing for wide-area mobile applications","volume":"31","author":"Li","year":"2024","journal-title":"IEEE Wirel Commun"},{"key":"ref62","series-title":"Proceedings of the 2023 57th Annual Conference on Information Sciences and Systems (CISS)","article-title":"An overview of quantum-safe approaches: quantum key distribution and post-quantum cryptography","author":"Xu","year":"2023 Mar 22\u201324"},{"key":"ref63","series-title":"Proceedings of the 2022 International Conference on Advanced Technologies for Communications (ATC)","article-title":"Quantum key distribution: a security solution for 5G-based IoT networks","author":"Pham","year":"2022 Oct 20\u201322"},{"key":"ref64","series-title":"Proceedings of the 2022 OITS International Conference on Information Technology (OCIT)","article-title":"Fog-QKD: towards secure geospatial data sharing mechanism in geospatial fog computing system based on Quantum Key Distribution","author":"Mukherjee","year":"2022 Dec 14\u201316"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"10916","DOI":"10.1109\/JIOT.2023.3242725","article-title":"Resource allocation in quantum-key-distribution-secured datacenter networks with cloud-edge collaboration","volume":"10","author":"Zhu","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"ref66","doi-asserted-by":"crossref","unstructured":"Cicconetti C, Sabella D, Noviello P, Paduanelli GD. Quantum-safe edge applications: how to secure computation in distributed computing systems. arXiv:2405.17008v1. 2024.","DOI":"10.1109\/PIMRC59610.2024.10817166"},{"key":"ref67","series-title":"Proceedings of the 2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS)","article-title":"Quantum-based QKD and sugar-salt encryption approach in cloud-fog computing to strengthen protection of online banking data","author":"Turjya","year":"2024 Jun 28\u201329"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"3426811","DOI":"10.1155\/2022\/3426811","article-title":"Secure data transmission using quantum cryptography in fog computing","volume":"2022","author":"Mangla","year":"2022","journal-title":"Wirel Commun Mob Comput"},{"key":"ref69","unstructured":"Hossain MI, Sumon SA, Hasan HM, Akter F, Badhon MB, Islam MNU. Quantum-edge cloud computing: a future paradigm for IoT applications. arXiv:2405.04824v1. 2024."},{"key":"ref70","doi-asserted-by":"crossref","first-page":"149","DOI":"10.3390\/e24020149","article-title":"DDKA-QKDN: dynamic on-demand key allocation scheme for quantum Internet of Things secured by QKD network","volume":"24","author":"Chen","year":"2022","journal-title":"Entropy"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"064040","DOI":"10.1103\/PhysRevApplied.20.064040","article-title":"Using Cascade in quantum key distribution","volume":"20","author":"Tupkary","year":"2023","journal-title":"Phys Rev Applied"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.ijleo.2018.12.023","article-title":"Parameter optimization of cascade in quantum key distribution","volume":"181","author":"Hu","year":"2019","journal-title":"Optik"},{"key":"ref73","series-title":"Advances in Cryptology\u2014EUROCRYPT\u201993","article-title":"Secret-key reconciliation by public discussion","author":"Brassard","year":"1993 May 23\u201327"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"025002","DOI":"10.1103\/RevModPhys.92.025002","article-title":"Secure quantum key distribution with realistic devices","volume":"92","author":"Xu","year":"2020","journal-title":"Rev Mod Phys"},{"key":"ref75","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511617744","author":"Van Assche","year":"2006","journal-title":"Quantum cryptography and secret-key distillation"},{"key":"ref76","first-page":"222","author":"Mehic","year":"2020","journal-title":"Reversible computation: extending horizons of computing"},{"key":"ref77","doi-asserted-by":"crossref","unstructured":"Martinez-Mateo J, Pacher C, Peev M, Ciurana A, Martin V. Demystifying the information reconciliation protocol cascade. arXiv:1407.3257v2. 2014.","DOI":"10.26421\/QIC15.5-6-6"},{"key":"ref78","unstructured":"Garcia-Escartin JC, Gimeno V, Moyano-Fern\u00e1ndez JJ. Quantum collision finding for homomorphic hash functions. arXiv:2108.00100v2. 2021."},{"key":"ref79","series-title":"Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P)","article-title":"CRYSTALS-kyber: a CCA-secure module-lattice-based KEM","author":"Bos","year":"2018 Apr 24\u201326"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"75","DOI":"10.30837\/rt.2022.3.210.05","article-title":"Status report on the third round of the NIST post-quantum cryptography standardization process","volume":"2022","author":"Yesina","year":"2022","journal-title":"Radiotekhnika"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1007\/s11276-024-03790-6","article-title":"Crystals kyber cryptographic algorithm for efficient IoT D2d communication","volume":"31","author":"Selvakumar","year":"2025","journal-title":"Wirel Netw"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"100242","DOI":"10.1016\/j.array.2022.100242","article-title":"Post-quantum cryptography Algorithm\u2019s standardization and performance analysis","volume":"15","author":"Kumar","year":"2022","journal-title":"Array"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"8744","DOI":"10.3390\/s23218744","article-title":"Post-quantum security: opportunities and challenges","volume":"23","author":"Li","year":"2023","journal-title":"Sensors"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s11235-022-00979-y","article-title":"Quantum secured 6G technology-based applications in Internet of everything","volume":"82","author":"Prateek","year":"2023","journal-title":"Telecommun Syst"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_62966\/TSP_CMC_62966.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:36:10Z","timestamp":1763343370000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":84,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062966","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}