{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T09:11:27Z","timestamp":1732785087196,"version":"3.29.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,26]]},"DOI":"10.1109\/iscc61673.2024.10733716","type":"proceedings-article","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T17:32:28Z","timestamp":1730395948000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Post-Quantum Cryptography into CoAP and MQTT-SN Protocols"],"prefix":"10.1109","author":[{"given":"Javier","family":"Blanco-Romero","sequence":"first","affiliation":[{"name":"Universidad Carlos III de Madrid,Departamento de Ingeniería Telemática,Madrid,Spain"}]},{"given":"Vicente","family":"Lorenzo","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid,Departamento de Ingeniería Telemática,Madrid,Spain"}]},{"given":"Florina","family":"Almenares","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid,Departamento de Ingeniería Telemática,Madrid,Spain"}]},{"given":"Daniel D\u00edaz","family":"S\u00e1nchez","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid,Departamento de Ingeniería Telemática,Madrid,Spain"}]},{"given":"Celeste","family":"Campo","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid,Departamento de Ingeniería Telemática,Madrid,Spain"}]},{"given":"Carlos Garc\u00eda","family":"Rubio","sequence":"additional","affiliation":[{"name":"Universidad Carlos III de Madrid,Departamento de Ingeniería Telemática,Madrid,Spain"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8413-upd1"},{"journal-title":"Position paper on quantum key distribution","year":"2024","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29371-9_13"},{"article-title":"libcoap: A coap (rfc 7252) implementation in c","year":"2024","author":"Bergmann","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"article-title":"qursa-uc3m\/libcoap-wolfssl. wolfssl integration in libcoap enabling dtls 1.3 and post-quantum crypto","year":"2024","author":"Blanco-Romero","key":"ref6"},{"article-title":"qursa-uc3m\/paho.mqtt-sn.embedded-c.wolfssl-pq.wolfssl integration into paho c mqtt-sn gateway and libraries for embedded systems for post-quantum cryptography evaluations","year":"2024","author":"Blanco-Romero","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384725"},{"year":"2022","key":"ref9","article-title":"Recomendaciones para una transici\u00f3n postcu\u00e1ntica segura"},{"year":"2023","key":"ref10","article-title":"Quantum-readiness: Migration to post-quantum cryptography"},{"year":"2024","key":"ref11","article-title":"Paho c mqtt-sn gateway and libraries for embedded systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8784"},{"volume-title":"Research agenda for a post-quantum dnssec","year":"2023","author":"Fregly","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81293-5_12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22829-2_6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927079"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31875-2_22"},{"year":"2023","key":"ref20","article-title":"libcoap 4.3.4 Documentation: coap-server"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33017-9_4"},{"article-title":"Global Risk Institute: Quantum Threat Timeline Report 2022","year":"2022","author":"Mosca","key":"ref22"},{"year":"2020","key":"ref23","article-title":"Quantum security technologies"},{"volume-title":"Draft fips (federal information processing standards) 203, module-lattice-based key-encapsulation mechanism standard","year":"2003","key":"ref24"},{"volume-title":"Draft fips (federal information processing standards) 204, module-lattice-based digital signature standard","year":"2003","key":"ref25"},{"volume-title":"Draft fips (federal information processing standards) 205, stateless hash-based digital signature standard","year":"2003","key":"ref26"},{"key":"ref27","article-title":"Quantum key distribution (qkd) and quantum cryptography (qc)"},{"key":"ref28","article-title":"OQS Provider - OpenSSL 3 provider containing post-quantum algorithms"},{"year":"2024","key":"ref29","article-title":"liboqs: Library for quantum-resistant cryptographic algorithms"},{"year":"2018","key":"ref30","article-title":"Clean, portable, tested implementations of post-quantum cryptography"},{"year":"2019","key":"ref31","article-title":"Post-quantum crypto library for the arm cortex-m4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108338"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/s22020489"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2019.2895392"},{"article-title":"wolfSSL: Set up initial port #1358","year":"2024","author":"Shallow","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref38","first-page":"1","article-title":"Analysis of the cryptographic algorithms in iot communications","author":"Silva","year":"2023","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"ref39","first-page":"1","article-title":"MQTT for sensor networks (mqtt-sn) protocol specification","volume":"1","author":"Stanford-Clark","year":"2013","journal-title":"International business machines (IBM) Corporation version"},{"volume-title":"Hybrid key exchange in tls 1.3","year":"2023","author":"Stebila","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3587135.3592821"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21280-2_24"},{"year":"2023","key":"ref44","article-title":"DTLS 1.3 support for Post-Quantum Cryptography"},{"volume-title":"wolfSSL Documentation: OpenSSL Compatibility","year":"2023","key":"ref45"}],"event":{"name":"2024 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2024,6,26]]},"location":"Paris, France","end":{"date-parts":[[2024,6,29]]}},"container-title":["2024 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10733347\/10733557\/10733716.pdf?arnumber=10733716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:52:47Z","timestamp":1732683167000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10733716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,26]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/iscc61673.2024.10733716","relation":{},"subject":[],"published":{"date-parts":[[2024,6,26]]}}}