Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme
In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The incorporation of advanced sensors, AI-driven embedded devices, and cloud-based remote control has significantly enh...
Uloženo v:
| Vydáno v: | Service oriented computing and applications Ročník 19; číslo 3; s. 251 - 262 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
London
Springer London
01.09.2025
Springer Nature B.V |
| Témata: | |
| ISSN: | 1863-2386, 1863-2394 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The incorporation of advanced sensors, AI-driven embedded devices, and cloud-based remote control has significantly enhanced the efficiency and profitability of IoT applications in numerous eras. Ensuring the security of IoT applications is crucial, with authentication emerging as a top priority. Lack of proper authentication may lead to unauthorized and risky activities, potentially causing hazardous situations within IoT applications. The current cryptographic methods employed in IoT devices rely on public-key cryptographic primitives, which, unfortunately, are susceptible to future quantum attacks. Therefore, there is a need to develop an effective signature scheme that can authenticate IoT devices resiliently against potential quantum threats. Hash-based post-quantum signature scheme stood as the best candidate to design quantum-safe authentication mechanisms. This paper presents a practical client–server implementation scenario tailored for IoT applications, showcasing the utilization of hash-based post-quantum digital signatures. Highlighting the complexity and computational demands of these signatures, the model architecture is illustrated using Raspberry Pi 3 and Pi 0 as servers, complemented by the widely used ESP32 as client devices in IoT applications achieving 32.83% optimized memory usage. |
|---|---|
| AbstractList | In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The incorporation of advanced sensors, AI-driven embedded devices, and cloud-based remote control has significantly enhanced the efficiency and profitability of IoT applications in numerous eras. Ensuring the security of IoT applications is crucial, with authentication emerging as a top priority. Lack of proper authentication may lead to unauthorized and risky activities, potentially causing hazardous situations within IoT applications. The current cryptographic methods employed in IoT devices rely on public-key cryptographic primitives, which, unfortunately, are susceptible to future quantum attacks. Therefore, there is a need to develop an effective signature scheme that can authenticate IoT devices resiliently against potential quantum threats. Hash-based post-quantum signature scheme stood as the best candidate to design quantum-safe authentication mechanisms. This paper presents a practical client–server implementation scenario tailored for IoT applications, showcasing the utilization of hash-based post-quantum digital signatures. Highlighting the complexity and computational demands of these signatures, the model architecture is illustrated using Raspberry Pi 3 and Pi 0 as servers, complemented by the widely used ESP32 as client devices in IoT applications achieving 32.83% optimized memory usage. |
| Author | Nasriwala, Jitendra Tandel, Purvi |
| Author_xml | – sequence: 1 givenname: Purvi orcidid: 0000-0001-6444-1831 surname: Tandel fullname: Tandel, Purvi email: purvitandel27@gmail.com organization: Department of Information Technology and Cyber Security, C G Patel Institute of Technology, Uka Tarsadia University – sequence: 2 givenname: Jitendra surname: Nasriwala fullname: Nasriwala, Jitendra organization: Babu Madhav Institute of Information Technology, Uka Tarsadia University |
| BookMark | eNp9kMtOwzAQRS1UJErpD7CyxNpgx7GTLFHFo1IlFpS15TiTNqW1U9sR5e9JHwKJRWfjkX3PnfG9RgPrLCB0y-g9ozR7CIxlkhGapITSlKVkd4GGLJecJLxIB799Lq_QOIQV7YsnWS6zIYJ3MJ0HrLu4BBsbo2PjLK693sCX85-4dh5P3Rzrtl2fXgPuQmMXWOOlDktS6gAVbl2IZNtpG7sNDs3C6rj3DWYJG7hBl7VeBxifzhH6eH6aT17J7O1lOnmcEcNZEYkwRZn1e1Y11Ikpy6qQZVEYkQuZVFnFBYiK0rIGw4H111TwNC9FWpnMSAkVH6G7o2_r3baDENXKdd72IxVPRJakqRSyV-VHlfEuBA-1Mk08_Cx63awVo2qfqzrmqvpc1SFXtevR5B_a-maj_fd5iB-h0IvtAvzfVmeoH6OYj4Y |
| CitedBy_id | crossref_primary_10_1007_s10791_025_09507_3 crossref_primary_10_1016_j_iot_2024_101391 crossref_primary_10_1109_OJCS_2025_3551877 |
| Cites_doi | 10.1007/978-3-319-49100-4_11 10.1007/978-3-642-38553-7_10 10.23919/DATE48585.2020.9116517 10.1109/ICOMET.2018.8346359 10.1007/978-3-030-38471-5_21 10.1016/j.future.2020.04.042 10.1109/SP46215.2023.10179381 10.1007/978-3-030-84242-0_22 10.1007/978-3-642-40588-4_14 10.1109/TCSI.2022.3200987 10.1109/TCSI.2021.3115786 10.1007/978-3-540-85893-5_8 10.1007/978-3-030-51938-4_13 10.1016/j.iot.2020.100174 10.1007/978-3-642-35999-6_5 10.1016/j.future.2023.06.008 10.1109/JIOT.2020.3013019 10.1007/978-3-030-03638-6_9 10.14569/ijacsa.2018.090354 10.6028/NIST.IR.8240 10.1109/ICCD50377.2020.00112 10.1007/978-3-030-19223-5_8 10.1007/978-3-642-25405-5_8 10.4213/mvk362 10.2139/ssrn.4548734 10.1016/j.jss.2015.07.007 10.1007/978-3-662-46800-5_15 10.18280/ria.370314 10.1002/spe.3121 10.1145/3197507.3197512 10.1109/CSITSS47250.2019.9031038 10.15673/atbp.v15i2.2527 10.1002/wics.1644 10.1109/TSUSC.2017.2716953 10.1109/TPDS.2022.3233348 10.46586/tches.v2021.i1.137-168 10.1007/978-3-031-22972-5_1 10.46586/tches.v2023.i2.80-11410.46586/tches.v2023.i2.80-114 10.1016/j.procs.2020.01.042 10.3934/amc.2019012 10.1186/s42400-022-00117-w 10.1007/978-3-662-49384-7_17 10.1007/978-3-540-88702-7 10.1007/978-3-030-27562-4_7 10.1002/spy2.200 10.1007/978-3-030-99277-4_18 10.1007/978-3-540-88403-3_5 10.22042/ISECURE.2021.272908.639 10.6028/nist.sp.800-208-draft 10.1016/j.bcra.2021.100036 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. – notice: The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024. |
| DBID | AAYXX CITATION JQ2 |
| DOI | 10.1007/s11761-024-00414-x |
| DatabaseName | CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1863-2394 |
| EndPage | 262 |
| ExternalDocumentID | 10_1007_s11761_024_00414_x |
| GroupedDBID | -Y2 .VR 06D 0R~ 123 203 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 406 408 409 40E 5VS 67Z 6NX 875 8TC 8UJ 95- 95. 95~ AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBRH ABBXA ABDBE ABDZT ABECU ABFSG ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABRTQ ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACSTC ACZOJ ADHHG ADHIR ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AEZWR AFBBN AFDZB AFGCZ AFHIU AFLOW AFOHR AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHPBZ AHSBF AHWEU AHYZX AIAKS AIGIU AIIXL AILAN AITGF AIXLP AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ATHPR AXYYD AYFIA AYJHY B-. BA0 BDATZ BGNMA CAG COF CS3 CSCUP DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ7 GQ8 GXS H13 HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HZ~ IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X J-C J0Z JBSCW JCJTX JZLTJ KDC KOV LLZTM M4Y MA- NPVJJ NQJWS NU0 O9- O93 O9J OAM P2P P9O PF0 PT4 QOS R89 R9I ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 YLTOR Z45 ZMTXR ~A9 AAYXX ABJCF AFFHD AFKRA ARAPS BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS JQ2 |
| ID | FETCH-LOGICAL-c319t-5c9b7238dfef2cbbd96b99c58562d7d35e5d00bfec3e1c5805348b54dc7c66ed3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001246503800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1863-2386 |
| IngestDate | Sat Nov 29 03:46:06 EST 2025 Tue Nov 18 22:32:58 EST 2025 Sat Nov 29 07:31:53 EST 2025 Sat Sep 13 01:10:29 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Keywords | Post-quantum cryptography Extended Merkle signature scheme Authentication mechanism IoT applications Hash-based cryptography |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-5c9b7238dfef2cbbd96b99c58562d7d35e5d00bfec3e1c5805348b54dc7c66ed3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-6444-1831 |
| PQID | 3257244656 |
| PQPubID | 2044172 |
| PageCount | 12 |
| ParticipantIDs | proquest_journals_3257244656 crossref_citationtrail_10_1007_s11761_024_00414_x crossref_primary_10_1007_s11761_024_00414_x springer_journals_10_1007_s11761_024_00414_x |
| PublicationCentury | 2000 |
| PublicationDate | 2025-09-01 |
| PublicationDateYYYYMMDD | 2025-09-01 |
| PublicationDate_xml | – month: 09 year: 2025 text: 2025-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London – name: Heidelberg |
| PublicationTitle | Service oriented computing and applications |
| PublicationTitleAbbrev | SOCA |
| PublicationYear | 2025 |
| Publisher | Springer London Springer Nature B.V |
| Publisher_xml | – name: Springer London – name: Springer Nature B.V |
| References | A Genêt (414_CR16) 2023; 2023 O Tsentseria (414_CR57) 2023; 15 414_CR30 414_CR31 414_CR32 P Mohan (414_CR42) 2020 414_CR38 414_CR39 F Shahid (414_CR53) 2020; 111 A Kumar (414_CR33) 2022 414_CR36 V Mavroeidis (414_CR40) 2018 A Hülsing (414_CR25) 2016 414_CR9 414_CR8 414_CR20 414_CR21 414_CR22 414_CR28 DJ Bernstein (414_CR5) 2009 414_CR23 H Oraei (414_CR44) 2022; 14 414_CR24 A Karakaya (414_CR29) 2024; 16 P Kampanakis (414_CR27) 2017; 2017 S Kumari (414_CR34) 2022 A Wagner (414_CR58) 2022; 10 414_CR1 414_CR52 414_CR2 JW Bos (414_CR7) 2021; 2021 N Li (414_CR37) 2017; 2 414_CR10 414_CR54 414_CR11 414_CR55 414_CR6 414_CR50 414_CR4 414_CR51 P Lafrance (414_CR35) 2019 414_CR17 414_CR18 414_CR19 414_CR12 Z Wang (414_CR60) 2023; 34 414_CR14 414_CR15 414_CR59 A Alfrhan (414_CR3) 2021; 2 A Hülsing (414_CR26) 2023 414_CR41 414_CR43 S Suhail (414_CR56) 2021; 8 Y Cao (414_CR13) 2022; 69 414_CR49 GC Pereira (414_CR46) 2016; 116 414_CR45 414_CR47 414_CR48 |
| References_xml | – ident: 414_CR41 doi: 10.1007/978-3-319-49100-4_11 – ident: 414_CR21 doi: 10.1007/978-3-642-38553-7_10 – ident: 414_CR48 doi: 10.23919/DATE48585.2020.9116517 – ident: 414_CR1 doi: 10.1109/ICOMET.2018.8346359 – ident: 414_CR52 – ident: 414_CR59 doi: 10.1007/978-3-030-38471-5_21 – volume: 111 start-page: 241 year: 2020 ident: 414_CR53 publication-title: Future Gener Comput Syst doi: 10.1016/j.future.2020.04.042 – start-page: 1435 volume-title: Sphincs+c: compressing sphincs+ with (almost) no cost year: 2023 ident: 414_CR26 doi: 10.1109/SP46215.2023.10179381 – ident: 414_CR19 doi: 10.1007/978-3-030-84242-0_22 – ident: 414_CR24 doi: 10.1007/978-3-642-40588-4_14 – volume: 69 start-page: 4908 year: 2022 ident: 414_CR13 publication-title: IEEE Trans Circuits Syst I Regul Pap doi: 10.1109/TCSI.2022.3200987 – ident: 414_CR12 doi: 10.1109/TCSI.2021.3115786 – ident: 414_CR49 doi: 10.1007/978-3-540-85893-5_8 – ident: 414_CR11 doi: 10.1007/978-3-030-51938-4_13 – ident: 414_CR39 doi: 10.1016/j.iot.2020.100174 – ident: 414_CR23 doi: 10.1007/978-3-642-35999-6_5 – ident: 414_CR50 doi: 10.1016/j.future.2023.06.008 – volume: 8 start-page: 1 year: 2021 ident: 414_CR56 publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2020.3013019 – ident: 414_CR43 – volume: 10 start-page: 3563831 issue: 1145/3560834 year: 2022 ident: 414_CR58 publication-title: Assoc Comput Mach – ident: 414_CR10 doi: 10.1007/978-3-030-03638-6_9 – year: 2018 ident: 414_CR40 publication-title: Int J Adv Comput Sci Appl doi: 10.14569/ijacsa.2018.090354 – ident: 414_CR2 doi: 10.6028/NIST.IR.8240 – year: 2020 ident: 414_CR42 publication-title: Inst Electr Electron Eng doi: 10.1109/ICCD50377.2020.00112 – ident: 414_CR14 doi: 10.1007/978-3-030-19223-5_8 – ident: 414_CR9 doi: 10.1007/978-3-642-25405-5_8 – ident: 414_CR32 doi: 10.4213/mvk362 – ident: 414_CR18 doi: 10.2139/ssrn.4548734 – volume: 116 start-page: 95 year: 2016 ident: 414_CR46 publication-title: J Syst Softw doi: 10.1016/j.jss.2015.07.007 – ident: 414_CR6 doi: 10.1007/978-3-662-46800-5_15 – ident: 414_CR30 doi: 10.18280/ria.370314 – year: 2022 ident: 414_CR34 publication-title: Softw Pract Exp doi: 10.1002/spe.3121 – ident: 414_CR4 doi: 10.1145/3197507.3197512 – ident: 414_CR47 doi: 10.1109/CSITSS47250.2019.9031038 – volume: 15 start-page: 66 year: 2023 ident: 414_CR57 publication-title: Autom Technol Bus Process doi: 10.15673/atbp.v15i2.2527 – volume: 16 issue: 1 year: 2024 ident: 414_CR29 publication-title: WIREs Comput Stat doi: 10.1002/wics.1644 – volume: 2 start-page: 359 year: 2017 ident: 414_CR37 publication-title: IEEE Trans Sustain Comput doi: 10.1109/TSUSC.2017.2716953 – volume: 34 start-page: 938 year: 2023 ident: 414_CR60 publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2022.3233348 – volume: 2021 start-page: 137 year: 2021 ident: 414_CR7 publication-title: IACR Trans Cryptogr Hardw Embed Syst doi: 10.46586/tches.v2021.i1.137-168 – ident: 414_CR22 doi: 10.1007/978-3-031-22972-5_1 – volume: 2023 start-page: 80 year: 2023 ident: 414_CR16 publication-title: IACR Trans Cryptogr Hardw Embed Syst doi: 10.46586/tches.v2023.i2.80-11410.46586/tches.v2023.i2.80-114 – ident: 414_CR55 – ident: 414_CR38 – ident: 414_CR54 doi: 10.1016/j.procs.2020.01.042 – year: 2019 ident: 414_CR35 publication-title: Adv Math Commun doi: 10.3934/amc.2019012 – ident: 414_CR36 doi: 10.1186/s42400-022-00117-w – ident: 414_CR17 – ident: 414_CR51 – start-page: 446 volume-title: Armed sphincs computing a 41kb signature in 16kb of ram year: 2016 ident: 414_CR25 doi: 10.1007/978-3-662-49384-7_17 – ident: 414_CR20 – volume-title: Post-quantum cryptography year: 2009 ident: 414_CR5 doi: 10.1007/978-3-540-88702-7 – ident: 414_CR45 doi: 10.1007/978-3-030-27562-4_7 – year: 2022 ident: 414_CR33 publication-title: Secur Priv doi: 10.1002/spy2.200 – ident: 414_CR31 doi: 10.1007/978-3-030-99277-4_18 – volume: 2017 start-page: 349 year: 2017 ident: 414_CR27 publication-title: IACR Cryptol ePrint Arch – ident: 414_CR8 doi: 10.1007/978-3-540-88403-3_5 – volume: 14 start-page: 1 year: 2022 ident: 414_CR44 publication-title: ISC Int J Inf Secur doi: 10.22042/ISECURE.2021.272908.639 – ident: 414_CR15 doi: 10.6028/nist.sp.800-208-draft – ident: 414_CR28 – volume: 2 start-page: 100036 year: 2021 ident: 414_CR3 publication-title: Blockchain Res Appl doi: 10.1016/j.bcra.2021.100036 |
| SSID | ssj0000327867 |
| Score | 2.3694394 |
| Snippet | In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 251 |
| SubjectTerms | Algorithms Artificial intelligence Authentication Client server systems Cloud computing Communication Computer Appl. in Administrative Data Processing Computer Science Computer Systems Organization and Communication Networks Cryptography Devices Digital signatures e-Commerce/e-business Internet of Things IT in Business Management of Computing and Information Systems Original Research Paper Remote control Software Engineering/Programming and Operating Systems Statelessness |
| Title | Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme |
| URI | https://link.springer.com/article/10.1007/s11761-024-00414-x https://www.proquest.com/docview/3257244656 |
| Volume | 19 |
| WOSCitedRecordID | wos001246503800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: Springer Journals customDbUrl: eissn: 1863-2394 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000327867 issn: 1863-2386 databaseCode: RSV dateStart: 20070401 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA8yffDF-YnTKXnwTQNts37kUcShIEN0jr2V5ssJrptrJ_75XrJ0VVFBX9v0KJfc3S_J3e8QOhEB83SoM6ID7hFDcU4yTwaEx4mMAG_T2NbCDG7iXi8ZDtmtKworqmz36krSeuq62M2HLTeBmEIMSVSHAHJchXCXGHO8ux8sT1Y8GsSJbR3rJxElEJMiVy3zvZjPEamGmV9uRm3A6Tb_96ubaMMBTHy-WBFbaEXl26hZNW_AzpZ3kLIn7QpnJsU9L93RHdZVshYGNIuvJ3388YobmzT5R5zhUVaMiImAEk8nRUle5jBD8zE26SCWKhTDrlmN1S566F72L66I67lABBhjSULBuOlDJrXSgeBcsogzJmBTEQUyljRUofQ8rpWgyofHYMOdhIcdKWIRRUrSPdTIJ7naR5gqrQA-amogQMYok0obekEBXgXkd1rIr_SeCkdIbvpiPKc1lbLRYwp6TK0e07cWOl1-M13Qcfw6ul1NZ-pMs0gpOKnA0sS10Fk1ffXrn6Ud_G34IVoPTK9gm4_WRo1yNldHaE28lk_F7Ngu2Xfgy-ci |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFA6igr44rzidmgffNNA2vT6KODacQ3SOvYU2Fye4bq6d-PM9ydpVRQV9bdNQTnJyviTf-Q5Cp9yJLOWpmCgnsYiWOCexJRySBKHwAW_TwOTC9DtBtxsOBtFtkRSWlWz38krSrNRVspsNW24CMYVokSiXAHJccSFiaSLf3X1_cbJiUScITelYO_QpgZjkF9ky33fzOSJVMPPLzagJOM3a_351E20UABNfzGfEFlqS6TaqlcUbcOHLO0iak3aJY01xT_Pi6A6rkqyFAc3i9riHP15xY02Tf8QxHsbZkOgIKPBknOXkZQYjNBthTQcxUqEYds1yJHfRQ_Oqd9kiRc0FwsEZc-LxKNF1yISSyuFJIiI_iSIOmwrfEYGgnvSEZSVKcipteAw-7IaJ5woecN-Xgu6h5XScyn2EqVQS4KOiGgLEEY2EVFpekMOqAv27dWSXdme8ECTXdTGeWSWlrO3IwI7M2JG91dHZ4pvJXI7j19aNcjhZ4ZoZo7BIOUYmro7Oy-GrXv_c28Hfmp-gtVbvpsM67e71IVp3dN1gw01roOV8OpNHaJW_5k_Z9NhM33e-Z-oG |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwEA8yRXxxfuJ0ah5807Cu6eejqENxjIFz7C20-XCC6-baiX--l6xdp6ggvrZpKLlc7ne5u98hdMbt0FKuioiyY4toinMSWcImsR8ID_A29U0tTL_tdzrBYBB2l6r4TbZ7EZKc1zRolqYka0yEapSFb01wvwnYF6IJoxwCKHLV0U2DtL_-0F_csljU9gPTRrYZeJSAffLyypnvp_lsnUrI-SVKaoxPq_r_395CmznwxJfznbKNVmSyg6pFUwec6_gukuYGXuJIp74nWX6lh1WRxIUB5eK7cQ8vh76xTp9_whEeRumQaMso8GScZuR1BpKbjbBOEzEUohi8aTmSe-ixddO7uiV5LwbCQUkz4vIw1v3JhJLK5nEsQi8OQw7OhmcLX1BXusKyYiU5lU14DLrtBLHrCO5zz5OC7qNKMk7kAcJUKgmwUlENDaKQhkIqTTvI4bSB-Z0aahYyYDwnKtf9Ml5YSbGs15HBOjKzjuy9hs4X30zmNB2_jq4XomW5yqaMwuFlG_q4GrooRFm-_nm2w78NP0Xr3esWa9917o_Qhq3bCZuUtTqqZNOZPEZr_C17TqcnZid_APM58uo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+authentication+framework+for+IoT+applications+using+a+hash-based+post-quantum+signature+scheme&rft.jtitle=Service+oriented+computing+and+applications&rft.au=Tandel%2C+Purvi&rft.au=Nasriwala%2C+Jitendra&rft.date=2025-09-01&rft.pub=Springer+Nature+B.V&rft.issn=1863-2386&rft.eissn=1863-2394&rft.volume=19&rft.issue=3&rft.spage=251&rft.epage=262&rft_id=info:doi/10.1007%2Fs11761-024-00414-x&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1863-2386&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1863-2386&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1863-2386&client=summon |