{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T13:38:52Z","timestamp":1772717932105,"version":"3.50.1"},"reference-count":60,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T00:00:00Z","timestamp":1772409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Universitas Indonesia through Hibah Publikasi Terindeks Internasional (PUTI) Q1 Kolaborasi Internasional Scheme","award":["PKS-291\/UN2.RST\/HKP.05.00\/2025"],"award-info":[{"award-number":["PKS-291\/UN2.RST\/HKP.05.00\/2025"]}]},{"name":"Indonesia Endowment Fund for Education or Lembaga Pengelola Dana Pendidikan (LPDP), Ministry of Finance of the Republic of Indonesia","award":["KEP1526\/LPDP\/LPDP.3\/2022"],"award-info":[{"award-number":["KEP1526\/LPDP\/LPDP.3\/2022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Vehicular ad hoc networks (VANETs) require authentication systems that balance privacy, scalability, and post-quantum security. While lattice-based V-LDAA offers quantum resistance, it faces challenges in signature size, traceability, and integration. We propose post-quantum traceable direct anonymous attestation (PQ-TDAA), combining National Institute of Standards and Technology (NIST)-standard Dilithium2 and Falcon-512 signatures with adapted Beullens-style blind signatures and Fiat\u2013Shamir simplified Schnorr proofs, reducing proof size by 69.2% (8 kB vs. V-LDAA\u2019s 26 kB) and supporting European Telecommunications Standards Institute Technical Specification (ETSI TS) 102 941-compliant traceability through Road Side Unit (RSU)-assisted verification. Evaluated using SageMath, Python 3.11, and NS-3, PQ-TDAA-Falcon-512 achieves 8.1 ms and 49.7 ms end-to-end delays at 10 and 20 vehicles, respectively, with 64.7 Mbps goodput on congested 802.11p channels, showing promise for densities of \u226450 vehicles and advantages over Dilithium2. Real-world validation on ARM Cortex-A76 (Raspberry Pi 5, emulating automotive OBUs) yields sub-0.5 ms V2V cycles within 100 ms beacon intervals, supporting practical embedded deployment. Future work will extend PQ-TDAA to emerging 5G and NR-V2X settings, integrate more realistic mobility and channel models through coupled NS-3 and SUMO co-simulation, and investigate side-channel resistance for enhanced scalability and robustness in real deployments.<\/jats:p>","DOI":"10.3390\/jcp6020044","type":"journal-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T16:06:59Z","timestamp":1772467619000},"page":"44","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Lightweight Post-Quantum Anonymous Attestation Framework for Traceable and Comprehensive Privacy Preservation in VANETs"],"prefix":"10.3390","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4917-8127","authenticated-orcid":false,"given":"Esti Rahmawati","family":"Agustina","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0374-4465","authenticated-orcid":false,"given":"Kalamullah","family":"Ramli","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3580-9128","authenticated-orcid":false,"given":"Ruki","family":"Harwahyu","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3345-4669","authenticated-orcid":false,"given":"Teddy Surya","family":"Gunawan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Kuala Lumpur 50728, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8282-1108","authenticated-orcid":false,"given":"Muhammad","family":"Salman","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6613-4114","authenticated-orcid":false,"given":"Andriani Adi","family":"Lestari","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universitas Indonesia, Depok 16424, Jawa Barat, Indonesia"}]},{"given":"Arif Rahman","family":"Hakim","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, Politeknik Siber dan Sandi Negara, Bogor 16120, Jawa Barat, Indonesia"}]}],"member":"1968","published-online":{"date-parts":[[2026,3,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"4260","DOI":"10.1109\/TITS.2025.3528932","article-title":"Identity-Based Authentication in VANETs: A Review","volume":"26","author":"Manasrah","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"153701","DOI":"10.1109\/ACCESS.2021.3125521","article-title":"A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues","volume":"9","author":"Jan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"88421","DOI":"10.1109\/ACCESS.2025.3570491","article-title":"A Systematic Literature Review on Privacy Preservation in VANETs: Trends, Challenges, and Future Directions","volume":"13","author":"Agustina","year":"2025","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"31309","DOI":"10.1109\/ACCESS.2021.3060046","article-title":"A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network","volume":"9","author":"Azam","year":"2021","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","article-title":"Securing Vehicular Communications","volume":"13","author":"Raya","year":"2006","journal-title":"IEEE Wirel. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., and Chen, L. (2004, January 25\u201329). Direct anonymous attestation. Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA.","DOI":"10.1145\/1030083.1030103"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"14025","DOI":"10.1109\/TITS.2021.3131668","article-title":"A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications","volume":"23","author":"Shim","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Chen, L., Tu, T., Yu, K., Zhao, M., and Wang, Y. (2021). V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System. Secur. Commun. Netw., 4660875.","DOI":"10.1155\/2021\/4660875"},{"key":"ref_9","unstructured":"Fiat, A., and Shamir, A. (1986). How to prove yourself: Practical solutions to identification and signature problems. Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Link\u00f6ping, Sweden, 20\u201322 May 1986, Springer."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","article-title":"Efficient signature generation by smart cards","volume":"4","author":"Schnorr","year":"1991","journal-title":"J. Cryptol."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V. (2009). Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2009, Tokyo, Japan, 6\u201310 December 2009, Springer.","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V. (2012). Lattice Signatures without Trapdoors. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2012, Cambridge, UK, 15\u201319 April 2012, Springer.","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Beullens, W., Lyubashevsky, V., Nguyen, N.K., and Seiler, G. (2023). Lattice-Based Blind Signatures: Short, Efficient, and Round-Optimal, Association for Computing Machinery.","DOI":"10.1145\/3576915.3616613"},{"key":"ref_14","unstructured":"(2022). Intelligent Transport Systems (ITS); Security; Trust and Privacy Management; Release 2 (Standard No. ETSI TS 102 941)."},{"key":"ref_15","unstructured":"National Institute of Standards and Technology (2024). FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism, National Institute of Standards and Technology."},{"key":"ref_16","unstructured":"National Institute of Standards and Technology (2024). FIPS 204 Module-Lattice-Based Digital Signature Standard, National Institute of Standards and Technology."},{"key":"ref_17","unstructured":"Fouque, P.-A., Gajland, P., de Groote, H., Janneck, J., and Kiltz, E. (2026, February 16). A Closer Look at Falcon. Cryptology ePrint Archive, Paper 2024\/1769. Available online: https:\/\/eprint.iacr.org\/2024\/1769."},{"key":"ref_18","unstructured":"(2025, November 03). Open Quantum Safe Project. Falcon. Available online: https:\/\/openquantumsafe.org\/liboqs\/algorithms\/sig\/falcon.html."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"12370","DOI":"10.1109\/TVT.2024.3383967","article-title":"Secure Lattice-Based Aggregate Signature Scheme for Vehicular Ad Hoc Networks","volume":"73","author":"Prajapat","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"206581","DOI":"10.1109\/ACCESS.2020.3038042","article-title":"Privacy Protection of VANET Based on Traceable Ring Signature on Ideal Lattice","volume":"8","author":"Han","year":"2020","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"7112","DOI":"10.1109\/TCE.2024.3453953","article-title":"Dynamic Anonymous Quantum-Secure Batch-Verifiable Authentication Scheme for VANET","volume":"70","author":"Wani","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"9629","DOI":"10.1109\/TIFS.2024.3477305","article-title":"Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks","volume":"19","author":"Li","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"4336","DOI":"10.1109\/TVT.2022.3147875","article-title":"Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network","volume":"71","author":"Li","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"4698","DOI":"10.1109\/TVT.2024.3485671","article-title":"LRCPA: Lattice-Based Robust and Conditional Privacy-Preserving Authentication for VANETs","volume":"74","author":"Liu","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_25","first-page":"100843","article-title":"LB-CLAS: Lattice-based conditional privacy-preserving certificateless aggregate signature scheme for VANET","volume":"50","author":"Xu","year":"2024","journal-title":"Veh. Commun."},{"key":"ref_26","unstructured":"Arm Limited (2024). Cortex-A76AE Automotive Enhanced: Datasheet, Arm Limited."},{"key":"ref_27","unstructured":"Raspberry Pi Ltd (2025). Raspberry Pi 5 Product Brief, Raspberry Pi Ltd."},{"key":"ref_28","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P., and Stoffelen, K. (2026, February 16). pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4; IACR Cryptology ePrint Archive, Paper 2019\/844. Available online: https:\/\/repository.ubn.ru.nl\/bitstream\/handle\/2066\/210214\/210214.pdf."},{"key":"ref_29","unstructured":"John, L.K. (2002). Performance Evaluation Techniques, Tools and Benchmarks, University of Texas at Austin."},{"key":"ref_30","unstructured":"Fog, A. (2021). The Microarchitecture of Intel, AMD and VIA CPUs: An Optimization Guide for Assembly Programmers and Compiler Makers, Technical University of Denmark."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"La Manna, M., Treccozzi, L., Perazzo, P., Saponara, S., and Dini, G. (2021). Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update. Sensors, 21.","DOI":"10.3390\/s21020515"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Nguyen, N.K., and Plan\u00e7on, M. (2022). Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General, Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-15979-4_3"},{"key":"ref_33","unstructured":"National Institute of Standards and Technology (2023). Advanced Encryption Standard (AES); 197 (FIPS 197), National Institute of Standards and Technology."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Dworkin, M. (2007). Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC; 800-38D, National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Whitefield, J., Chen, L., Giannetsos, T., Schneider, S., and Treharne, H. (2017, January 27\u201329). Privacy-enhanced capabilities for VANETs using direct anonymous attestation. Proceedings of the 2017 IEEE Vehicular Networking Conference (VNC), Torino, Turin, Italy.","DOI":"10.1109\/VNC.2017.8275615"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/JSAC.2011.110310","article-title":"Threshold Anonymous Announcement in VANETs","volume":"29","author":"Chen","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Desmoulins, N., Diop, A., Raffl\u00e9, Y., Traor\u00e9, J., and Gratesac, J. (2019, January 4\u20136). Practical Anonymous Attestation-based Pseudonym Schemes for Vehicular Networks. Proceedings of the 2019 IEEE Vehicular Networking Conference (VNC), Los Angeles, CA, USA.","DOI":"10.1109\/VNC48660.2019.9062804"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"e3810","DOI":"10.1002\/ett.3810","article-title":"LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication","volume":"31","author":"Dharminder","year":"2020","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1109\/TVT.2023.3305037","article-title":"LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs","volume":"73","author":"Wen","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"5463","DOI":"10.1109\/JSYST.2020.2980297","article-title":"Efficient Lattice-Based Ring Signature for Message Authentication in VANETs","volume":"14","author":"Mundhe","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Wang, F., Gu, M., Xiao, H., Wang, Y., and Cao, C. (2025). Secure and Efficient Attribute-based Batch Authentication Scheme for VANETs. IEEE Netw.","DOI":"10.1109\/MNET.2025.3568008"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Agustina, E.R., Hakim, A.R., and Ramli, K. (2024, January 28\u201329). Modeling Data Security and Privacy Threats for VANET using STRIDE and LINDDUN. Proceedings of the 2024 2nd International Conference on Software Engineering and Information Technology (ICoSEIT), Bandung, Indonesia.","DOI":"10.1109\/ICoSEIT60086.2024.10497513"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Cremers, C.J.F. (2008). The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. Proceedings of the Computer Aided Verification, Princeton, NJ, USA, 7\u201314 July 2008, Springer.","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-25385-0_1","article-title":"BKZ 2.0: Better Lattice Security Estimates","volume":"7073","author":"Chen","year":"2011","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Alagic, G., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y.-K., Miller, C., Moody, D., Peralta, R., and Perlner, R. (2022). Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process, National Institute of Standards and Technology.","DOI":"10.6028\/NIST.IR.8413-upd1"},{"key":"ref_46","unstructured":"(2016). On-Board System Requirements for V2V Safety Communications (Standard No. J2945_1_201603)."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"5226390","DOI":"10.1155\/2022\/5226390","article-title":"Crystals-Dilithium on ARMv8","volume":"2022","author":"Kim","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"44446","DOI":"10.1109\/ACCESS.2022.3169784","article-title":"Accelerating Falcon on ARMv8","volume":"10","author":"Kim","year":"2022","journal-title":"IEEE Access"},{"key":"ref_49","unstructured":"Kementerian Perhubungan Republik Indonesia (2015). Peraturan Menteri Perhubungan Nomor 96 Tahun 2015 Tentang Pedoman Pelaksanaan Kegiatan Manajemen dan Rekayasa Lalu Lintas, Kementerian Perhubungan Republik Indonesia."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Karnadi, F.K., Mo, Z.H., and Lan, K.-C. (2007, January 11\u201315). Rapid Generation of Realistic Mobility Models for VANET. Proceedings of the IEEE Wireless Communications and Networking Conference, Hong Kong, China.","DOI":"10.1109\/WCNC.2007.467"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TMC.2010.133","article-title":"Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis","volume":"10","author":"Sommer","year":"2011","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"3757","DOI":"10.1109\/TVT.2008.918731","article-title":"Performance Analysis of IEEE 802.11 Broadcast Scheme in Ad Hoc Wireless LANs","volume":"57","author":"Ma","year":"2008","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_53","first-page":"8756","article-title":"A Methodology for Studying 802.11p VANET Broadcasting Performance with Practical Vehicle Distribution","volume":"65","author":"Qiu","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Hota, L., Nayak, B.P., Kumar, A., Sahoo, B., and Ali, G.G.M.N. (2022). A Performance Analysis of VANETs Propagation Models and Routing Protocols. Sustainability, 14.","DOI":"10.3390\/su14031379"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Bilstrup, K., Uhlemann, E., Str\u00f6m, E.G., and Bilstrup, U. (2008, January 21\u201324). Evaluation of the IEEE 802.11p MAC Method for Vehicle-to-Vehicle Communication. Proceedings of the IEEE 68th Vehicular Technology Conference (VTC Fall), Calgary, AB, Canada.","DOI":"10.1109\/VETECF.2008.446"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Studer, A., Bai, F., Bellur, B., and Perrig, A. (2008). Flexible, Extensible, and Efficient VANET Authentication. Proceedings of the 6th Embedded Security in Cars Conference, KICS.","DOI":"10.1109\/JCN.2009.6388411"},{"key":"ref_57","unstructured":"Postel, J. (2025, December 20). Internet Protocol; RFC 791; IETF. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc791."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Van Eenennaam, M., Remke, A., and Heijenk, G. (2012, January 14\u201316). An Analytical Model for Beaconing in VANETs. Proceedings of the IEEE Vehicular Networking Conference, Seoul, Republic of Korea.","DOI":"10.1109\/VNC.2012.6407451"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"7430728","DOI":"10.1155\/2018\/7430728","article-title":"A Simulation-Based Analysis of the Loss Process of Broadcast Packets in WAVE Vehicular Networks","volume":"2018","author":"Gonzalez","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_60","unstructured":"IEEE (2010). IEEE Standard for Information Technology\u2014Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks\u2014Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments, IEEE."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/6\/2\/44\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T12:36:33Z","timestamp":1772714193000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/6\/2\/44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,2]]},"references-count":60,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["jcp6020044"],"URL":"https:\/\/doi.org\/10.3390\/jcp6020044","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,2]]}}}