Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme

In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The incorporation of advanced sensors, AI-driven embedded devices, and cloud-based remote control has significantly enh...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Service oriented computing and applications Ročník 19; číslo 3; s. 251 - 262
Hlavní autoři: Tandel, Purvi, Nasriwala, Jitendra
Médium: Journal Article
Jazyk:angličtina
Vydáno: London Springer London 01.09.2025
Springer Nature B.V
Témata:
ISSN:1863-2386, 1863-2394
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The incorporation of advanced sensors, AI-driven embedded devices, and cloud-based remote control has significantly enhanced the efficiency and profitability of IoT applications in numerous eras. Ensuring the security of IoT applications is crucial, with authentication emerging as a top priority. Lack of proper authentication may lead to unauthorized and risky activities, potentially causing hazardous situations within IoT applications. The current cryptographic methods employed in IoT devices rely on public-key cryptographic primitives, which, unfortunately, are susceptible to future quantum attacks. Therefore, there is a need to develop an effective signature scheme that can authenticate IoT devices resiliently against potential quantum threats. Hash-based post-quantum signature scheme stood as the best candidate to design quantum-safe authentication mechanisms. This paper presents a practical client–server implementation scenario tailored for IoT applications, showcasing the utilization of hash-based post-quantum digital signatures. Highlighting the complexity and computational demands of these signatures, the model architecture is illustrated using Raspberry Pi 3 and Pi 0 as servers, complemented by the widely used ESP32 as client devices in IoT applications achieving 32.83% optimized memory usage.
AbstractList In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The incorporation of advanced sensors, AI-driven embedded devices, and cloud-based remote control has significantly enhanced the efficiency and profitability of IoT applications in numerous eras. Ensuring the security of IoT applications is crucial, with authentication emerging as a top priority. Lack of proper authentication may lead to unauthorized and risky activities, potentially causing hazardous situations within IoT applications. The current cryptographic methods employed in IoT devices rely on public-key cryptographic primitives, which, unfortunately, are susceptible to future quantum attacks. Therefore, there is a need to develop an effective signature scheme that can authenticate IoT devices resiliently against potential quantum threats. Hash-based post-quantum signature scheme stood as the best candidate to design quantum-safe authentication mechanisms. This paper presents a practical client–server implementation scenario tailored for IoT applications, showcasing the utilization of hash-based post-quantum digital signatures. Highlighting the complexity and computational demands of these signatures, the model architecture is illustrated using Raspberry Pi 3 and Pi 0 as servers, complemented by the widely used ESP32 as client devices in IoT applications achieving 32.83% optimized memory usage.
Author Nasriwala, Jitendra
Tandel, Purvi
Author_xml – sequence: 1
  givenname: Purvi
  orcidid: 0000-0001-6444-1831
  surname: Tandel
  fullname: Tandel, Purvi
  email: purvitandel27@gmail.com
  organization: Department of Information Technology and Cyber Security, C G Patel Institute of Technology, Uka Tarsadia University
– sequence: 2
  givenname: Jitendra
  surname: Nasriwala
  fullname: Nasriwala, Jitendra
  organization: Babu Madhav Institute of Information Technology, Uka Tarsadia University
BookMark eNp9kMtOwzAQRS1UJErpD7CyxNpgx7GTLFHFo1IlFpS15TiTNqW1U9sR5e9JHwKJRWfjkX3PnfG9RgPrLCB0y-g9ozR7CIxlkhGapITSlKVkd4GGLJecJLxIB799Lq_QOIQV7YsnWS6zIYJ3MJ0HrLu4BBsbo2PjLK693sCX85-4dh5P3Rzrtl2fXgPuQmMXWOOlDktS6gAVbl2IZNtpG7sNDs3C6rj3DWYJG7hBl7VeBxifzhH6eH6aT17J7O1lOnmcEcNZEYkwRZn1e1Y11Ikpy6qQZVEYkQuZVFnFBYiK0rIGw4H111TwNC9FWpnMSAkVH6G7o2_r3baDENXKdd72IxVPRJakqRSyV-VHlfEuBA-1Mk08_Cx63awVo2qfqzrmqvpc1SFXtevR5B_a-maj_fd5iB-h0IvtAvzfVmeoH6OYj4Y
CitedBy_id crossref_primary_10_1007_s10791_025_09507_3
crossref_primary_10_1016_j_iot_2024_101391
crossref_primary_10_1109_OJCS_2025_3551877
Cites_doi 10.1007/978-3-319-49100-4_11
10.1007/978-3-642-38553-7_10
10.23919/DATE48585.2020.9116517
10.1109/ICOMET.2018.8346359
10.1007/978-3-030-38471-5_21
10.1016/j.future.2020.04.042
10.1109/SP46215.2023.10179381
10.1007/978-3-030-84242-0_22
10.1007/978-3-642-40588-4_14
10.1109/TCSI.2022.3200987
10.1109/TCSI.2021.3115786
10.1007/978-3-540-85893-5_8
10.1007/978-3-030-51938-4_13
10.1016/j.iot.2020.100174
10.1007/978-3-642-35999-6_5
10.1016/j.future.2023.06.008
10.1109/JIOT.2020.3013019
10.1007/978-3-030-03638-6_9
10.14569/ijacsa.2018.090354
10.6028/NIST.IR.8240
10.1109/ICCD50377.2020.00112
10.1007/978-3-030-19223-5_8
10.1007/978-3-642-25405-5_8
10.4213/mvk362
10.2139/ssrn.4548734
10.1016/j.jss.2015.07.007
10.1007/978-3-662-46800-5_15
10.18280/ria.370314
10.1002/spe.3121
10.1145/3197507.3197512
10.1109/CSITSS47250.2019.9031038
10.15673/atbp.v15i2.2527
10.1002/wics.1644
10.1109/TSUSC.2017.2716953
10.1109/TPDS.2022.3233348
10.46586/tches.v2021.i1.137-168
10.1007/978-3-031-22972-5_1
10.46586/tches.v2023.i2.80-11410.46586/tches.v2023.i2.80-114
10.1016/j.procs.2020.01.042
10.3934/amc.2019012
10.1186/s42400-022-00117-w
10.1007/978-3-662-49384-7_17
10.1007/978-3-540-88702-7
10.1007/978-3-030-27562-4_7
10.1002/spy2.200
10.1007/978-3-030-99277-4_18
10.1007/978-3-540-88403-3_5
10.22042/ISECURE.2021.272908.639
10.6028/nist.sp.800-208-draft
10.1016/j.bcra.2021.100036
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024 Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
– notice: The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s11761-024-00414-x
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1863-2394
EndPage 262
ExternalDocumentID 10_1007_s11761_024_00414_x
GroupedDBID -Y2
.VR
06D
0R~
123
203
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
4.4
406
408
409
40E
5VS
67Z
6NX
875
8TC
8UJ
95-
95.
95~
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBRH
ABBXA
ABDBE
ABDZT
ABECU
ABFSG
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABRTQ
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACSTC
ACZOJ
ADHHG
ADHIR
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AEZWR
AFBBN
AFDZB
AFGCZ
AFHIU
AFLOW
AFOHR
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHPBZ
AHSBF
AHWEU
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AIXLP
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ATHPR
AXYYD
AYFIA
AYJHY
B-.
BA0
BDATZ
BGNMA
CAG
COF
CS3
CSCUP
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HZ~
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
LLZTM
M4Y
MA-
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P2P
P9O
PF0
PT4
QOS
R89
R9I
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
YLTOR
Z45
ZMTXR
~A9
AAYXX
ABJCF
AFFHD
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
K7-
M7S
PHGZM
PHGZT
PQGLB
PTHSS
JQ2
ID FETCH-LOGICAL-c319t-5c9b7238dfef2cbbd96b99c58562d7d35e5d00bfec3e1c5805348b54dc7c66ed3
IEDL.DBID RSV
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001246503800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1863-2386
IngestDate Sat Nov 29 03:46:06 EST 2025
Tue Nov 18 22:32:58 EST 2025
Sat Nov 29 07:31:53 EST 2025
Sat Sep 13 01:10:29 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Post-quantum cryptography
Extended Merkle signature scheme
Authentication mechanism
IoT applications
Hash-based cryptography
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-5c9b7238dfef2cbbd96b99c58562d7d35e5d00bfec3e1c5805348b54dc7c66ed3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-6444-1831
PQID 3257244656
PQPubID 2044172
PageCount 12
ParticipantIDs proquest_journals_3257244656
crossref_citationtrail_10_1007_s11761_024_00414_x
crossref_primary_10_1007_s11761_024_00414_x
springer_journals_10_1007_s11761_024_00414_x
PublicationCentury 2000
PublicationDate 2025-09-01
PublicationDateYYYYMMDD 2025-09-01
PublicationDate_xml – month: 09
  year: 2025
  text: 2025-09-01
  day: 01
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
– name: Heidelberg
PublicationTitle Service oriented computing and applications
PublicationTitleAbbrev SOCA
PublicationYear 2025
Publisher Springer London
Springer Nature B.V
Publisher_xml – name: Springer London
– name: Springer Nature B.V
References A Genêt (414_CR16) 2023; 2023
O Tsentseria (414_CR57) 2023; 15
414_CR30
414_CR31
414_CR32
P Mohan (414_CR42) 2020
414_CR38
414_CR39
F Shahid (414_CR53) 2020; 111
A Kumar (414_CR33) 2022
414_CR36
V Mavroeidis (414_CR40) 2018
A Hülsing (414_CR25) 2016
414_CR9
414_CR8
414_CR20
414_CR21
414_CR22
414_CR28
DJ Bernstein (414_CR5) 2009
414_CR23
H Oraei (414_CR44) 2022; 14
414_CR24
A Karakaya (414_CR29) 2024; 16
P Kampanakis (414_CR27) 2017; 2017
S Kumari (414_CR34) 2022
A Wagner (414_CR58) 2022; 10
414_CR1
414_CR52
414_CR2
JW Bos (414_CR7) 2021; 2021
N Li (414_CR37) 2017; 2
414_CR10
414_CR54
414_CR11
414_CR55
414_CR6
414_CR50
414_CR4
414_CR51
P Lafrance (414_CR35) 2019
414_CR17
414_CR18
414_CR19
414_CR12
Z Wang (414_CR60) 2023; 34
414_CR14
414_CR15
414_CR59
A Alfrhan (414_CR3) 2021; 2
A Hülsing (414_CR26) 2023
414_CR41
414_CR43
S Suhail (414_CR56) 2021; 8
Y Cao (414_CR13) 2022; 69
414_CR49
GC Pereira (414_CR46) 2016; 116
414_CR45
414_CR47
414_CR48
References_xml – ident: 414_CR41
  doi: 10.1007/978-3-319-49100-4_11
– ident: 414_CR21
  doi: 10.1007/978-3-642-38553-7_10
– ident: 414_CR48
  doi: 10.23919/DATE48585.2020.9116517
– ident: 414_CR1
  doi: 10.1109/ICOMET.2018.8346359
– ident: 414_CR52
– ident: 414_CR59
  doi: 10.1007/978-3-030-38471-5_21
– volume: 111
  start-page: 241
  year: 2020
  ident: 414_CR53
  publication-title: Future Gener Comput Syst
  doi: 10.1016/j.future.2020.04.042
– start-page: 1435
  volume-title: Sphincs+c: compressing sphincs+ with (almost) no cost
  year: 2023
  ident: 414_CR26
  doi: 10.1109/SP46215.2023.10179381
– ident: 414_CR19
  doi: 10.1007/978-3-030-84242-0_22
– ident: 414_CR24
  doi: 10.1007/978-3-642-40588-4_14
– volume: 69
  start-page: 4908
  year: 2022
  ident: 414_CR13
  publication-title: IEEE Trans Circuits Syst I Regul Pap
  doi: 10.1109/TCSI.2022.3200987
– ident: 414_CR12
  doi: 10.1109/TCSI.2021.3115786
– ident: 414_CR49
  doi: 10.1007/978-3-540-85893-5_8
– ident: 414_CR11
  doi: 10.1007/978-3-030-51938-4_13
– ident: 414_CR39
  doi: 10.1016/j.iot.2020.100174
– ident: 414_CR23
  doi: 10.1007/978-3-642-35999-6_5
– ident: 414_CR50
  doi: 10.1016/j.future.2023.06.008
– volume: 8
  start-page: 1
  year: 2021
  ident: 414_CR56
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2020.3013019
– ident: 414_CR43
– volume: 10
  start-page: 3563831
  issue: 1145/3560834
  year: 2022
  ident: 414_CR58
  publication-title: Assoc Comput Mach
– ident: 414_CR10
  doi: 10.1007/978-3-030-03638-6_9
– year: 2018
  ident: 414_CR40
  publication-title: Int J Adv Comput Sci Appl
  doi: 10.14569/ijacsa.2018.090354
– ident: 414_CR2
  doi: 10.6028/NIST.IR.8240
– year: 2020
  ident: 414_CR42
  publication-title: Inst Electr Electron Eng
  doi: 10.1109/ICCD50377.2020.00112
– ident: 414_CR14
  doi: 10.1007/978-3-030-19223-5_8
– ident: 414_CR9
  doi: 10.1007/978-3-642-25405-5_8
– ident: 414_CR32
  doi: 10.4213/mvk362
– ident: 414_CR18
  doi: 10.2139/ssrn.4548734
– volume: 116
  start-page: 95
  year: 2016
  ident: 414_CR46
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2015.07.007
– ident: 414_CR6
  doi: 10.1007/978-3-662-46800-5_15
– ident: 414_CR30
  doi: 10.18280/ria.370314
– year: 2022
  ident: 414_CR34
  publication-title: Softw Pract Exp
  doi: 10.1002/spe.3121
– ident: 414_CR4
  doi: 10.1145/3197507.3197512
– ident: 414_CR47
  doi: 10.1109/CSITSS47250.2019.9031038
– volume: 15
  start-page: 66
  year: 2023
  ident: 414_CR57
  publication-title: Autom Technol Bus Process
  doi: 10.15673/atbp.v15i2.2527
– volume: 16
  issue: 1
  year: 2024
  ident: 414_CR29
  publication-title: WIREs Comput Stat
  doi: 10.1002/wics.1644
– volume: 2
  start-page: 359
  year: 2017
  ident: 414_CR37
  publication-title: IEEE Trans Sustain Comput
  doi: 10.1109/TSUSC.2017.2716953
– volume: 34
  start-page: 938
  year: 2023
  ident: 414_CR60
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2022.3233348
– volume: 2021
  start-page: 137
  year: 2021
  ident: 414_CR7
  publication-title: IACR Trans Cryptogr Hardw Embed Syst
  doi: 10.46586/tches.v2021.i1.137-168
– ident: 414_CR22
  doi: 10.1007/978-3-031-22972-5_1
– volume: 2023
  start-page: 80
  year: 2023
  ident: 414_CR16
  publication-title: IACR Trans Cryptogr Hardw Embed Syst
  doi: 10.46586/tches.v2023.i2.80-11410.46586/tches.v2023.i2.80-114
– ident: 414_CR55
– ident: 414_CR38
– ident: 414_CR54
  doi: 10.1016/j.procs.2020.01.042
– year: 2019
  ident: 414_CR35
  publication-title: Adv Math Commun
  doi: 10.3934/amc.2019012
– ident: 414_CR36
  doi: 10.1186/s42400-022-00117-w
– ident: 414_CR17
– ident: 414_CR51
– start-page: 446
  volume-title: Armed sphincs computing a 41kb signature in 16kb of ram
  year: 2016
  ident: 414_CR25
  doi: 10.1007/978-3-662-49384-7_17
– ident: 414_CR20
– volume-title: Post-quantum cryptography
  year: 2009
  ident: 414_CR5
  doi: 10.1007/978-3-540-88702-7
– ident: 414_CR45
  doi: 10.1007/978-3-030-27562-4_7
– year: 2022
  ident: 414_CR33
  publication-title: Secur Priv
  doi: 10.1002/spy2.200
– ident: 414_CR31
  doi: 10.1007/978-3-030-99277-4_18
– volume: 2017
  start-page: 349
  year: 2017
  ident: 414_CR27
  publication-title: IACR Cryptol ePrint Arch
– ident: 414_CR8
  doi: 10.1007/978-3-540-88403-3_5
– volume: 14
  start-page: 1
  year: 2022
  ident: 414_CR44
  publication-title: ISC Int J Inf Secur
  doi: 10.22042/ISECURE.2021.272908.639
– ident: 414_CR15
  doi: 10.6028/nist.sp.800-208-draft
– ident: 414_CR28
– volume: 2
  start-page: 100036
  year: 2021
  ident: 414_CR3
  publication-title: Blockchain Res Appl
  doi: 10.1016/j.bcra.2021.100036
SSID ssj0000327867
Score 2.3694394
Snippet In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 251
SubjectTerms Algorithms
Artificial intelligence
Authentication
Client server systems
Cloud computing
Communication
Computer Appl. in Administrative Data Processing
Computer Science
Computer Systems Organization and Communication Networks
Cryptography
Devices
Digital signatures
e-Commerce/e-business
Internet of Things
IT in Business
Management of Computing and Information Systems
Original Research Paper
Remote control
Software Engineering/Programming and Operating Systems
Statelessness
Title Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme
URI https://link.springer.com/article/10.1007/s11761-024-00414-x
https://www.proquest.com/docview/3257244656
Volume 19
WOSCitedRecordID wos001246503800001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: Springer Journals
  customDbUrl:
  eissn: 1863-2394
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000327867
  issn: 1863-2386
  databaseCode: RSV
  dateStart: 20070401
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA8yffDF-YnTKXnwTQNts37kUcShIEN0jr2V5ssJrptrJ_75XrJ0VVFBX9v0KJfc3S_J3e8QOhEB83SoM6ID7hFDcU4yTwaEx4mMAG_T2NbCDG7iXi8ZDtmtKworqmz36krSeuq62M2HLTeBmEIMSVSHAHJchXCXGHO8ux8sT1Y8GsSJbR3rJxElEJMiVy3zvZjPEamGmV9uRm3A6Tb_96ubaMMBTHy-WBFbaEXl26hZNW_AzpZ3kLIn7QpnJsU9L93RHdZVshYGNIuvJ3388YobmzT5R5zhUVaMiImAEk8nRUle5jBD8zE26SCWKhTDrlmN1S566F72L66I67lABBhjSULBuOlDJrXSgeBcsogzJmBTEQUyljRUofQ8rpWgyofHYMOdhIcdKWIRRUrSPdTIJ7naR5gqrQA-amogQMYok0obekEBXgXkd1rIr_SeCkdIbvpiPKc1lbLRYwp6TK0e07cWOl1-M13Qcfw6ul1NZ-pMs0gpOKnA0sS10Fk1ffXrn6Ud_G34IVoPTK9gm4_WRo1yNldHaE28lk_F7Ngu2Xfgy-ci
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFA6igr44rzidmgffNNA2vT6KODacQ3SOvYU2Fye4bq6d-PM9ydpVRQV9bdNQTnJyviTf-Q5Cp9yJLOWpmCgnsYiWOCexJRySBKHwAW_TwOTC9DtBtxsOBtFtkRSWlWz38krSrNRVspsNW24CMYVokSiXAHJccSFiaSLf3X1_cbJiUScITelYO_QpgZjkF9ky33fzOSJVMPPLzagJOM3a_351E20UABNfzGfEFlqS6TaqlcUbcOHLO0iak3aJY01xT_Pi6A6rkqyFAc3i9riHP15xY02Tf8QxHsbZkOgIKPBknOXkZQYjNBthTQcxUqEYds1yJHfRQ_Oqd9kiRc0FwsEZc-LxKNF1yISSyuFJIiI_iSIOmwrfEYGgnvSEZSVKcipteAw-7IaJ5woecN-Xgu6h5XScyn2EqVQS4KOiGgLEEY2EVFpekMOqAv27dWSXdme8ECTXdTGeWSWlrO3IwI7M2JG91dHZ4pvJXI7j19aNcjhZ4ZoZo7BIOUYmro7Oy-GrXv_c28Hfmp-gtVbvpsM67e71IVp3dN1gw01roOV8OpNHaJW_5k_Z9NhM33e-Z-oG
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwEA8yRXxxfuJ0ah5807Cu6eejqENxjIFz7C20-XCC6-baiX--l6xdp6ggvrZpKLlc7ne5u98hdMbt0FKuioiyY4toinMSWcImsR8ID_A29U0tTL_tdzrBYBB2l6r4TbZ7EZKc1zRolqYka0yEapSFb01wvwnYF6IJoxwCKHLV0U2DtL_-0F_csljU9gPTRrYZeJSAffLyypnvp_lsnUrI-SVKaoxPq_r_395CmznwxJfznbKNVmSyg6pFUwec6_gukuYGXuJIp74nWX6lh1WRxIUB5eK7cQ8vh76xTp9_whEeRumQaMso8GScZuR1BpKbjbBOEzEUohi8aTmSe-ixddO7uiV5LwbCQUkz4vIw1v3JhJLK5nEsQi8OQw7OhmcLX1BXusKyYiU5lU14DLrtBLHrCO5zz5OC7qNKMk7kAcJUKgmwUlENDaKQhkIqTTvI4bSB-Z0aahYyYDwnKtf9Ml5YSbGs15HBOjKzjuy9hs4X30zmNB2_jq4XomW5yqaMwuFlG_q4GrooRFm-_nm2w78NP0Xr3esWa9917o_Qhq3bCZuUtTqqZNOZPEZr_C17TqcnZid_APM58uo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+authentication+framework+for+IoT+applications+using+a+hash-based+post-quantum+signature+scheme&rft.jtitle=Service+oriented+computing+and+applications&rft.au=Tandel%2C+Purvi&rft.au=Nasriwala%2C+Jitendra&rft.date=2025-09-01&rft.pub=Springer+Nature+B.V&rft.issn=1863-2386&rft.eissn=1863-2394&rft.volume=19&rft.issue=3&rft.spage=251&rft.epage=262&rft_id=info:doi/10.1007%2Fs11761-024-00414-x&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1863-2386&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1863-2386&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1863-2386&client=summon