{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2604.24205","arxiv_id":"2604.24205","integrity":{"available":true,"endpoint":"/pith/2604.24205/integrity.json","summary":{"critical":8,"advisory":3,"informational":0,"by_detector":{"doi_compliance":{"total":11,"critical":8,"advisory":3,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-21T07:36:07.593958Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:22:21.972677Z","findings_count":11}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/978-981-15-8083-3_5/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/978-981-15-8083-3_5/cover","detected_arxiv_id":null,"ref_index":111,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-030-66922-5_18/coverin) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-030-66922-5_18/coverin","detected_arxiv_id":null,"ref_index":120,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/978-3-031-20738-9_145/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/978-3-031-20738-9_145/cover","detected_arxiv_id":null,"ref_index":51,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/s10796-021-10199-5/figures/6' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/s10796-021-10199-5/figures/6","detected_arxiv_id":null,"ref_index":65,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/978-3-030-79725-6_18/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/978-3-030-79725-6_18/cover","detected_arxiv_id":null,"ref_index":104,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-42924-8_14/coverin) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/978-3-031-42924-8_14/coverin","detected_arxiv_id":null,"ref_index":46,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/978-981-99-1051-9_21/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/978-981-99-1051-9_21/cover","detected_arxiv_id":null,"ref_index":56,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1063/5.0127923/2895782' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1063/5.0127923/2895782","detected_arxiv_id":null,"ref_index":91,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/978-3-031-36625-3_31/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/978-3-031-36625-3_31/cover","detected_arxiv_id":null,"ref_index":50,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1063/5.0110599/2828650sensors) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1063/5.0110599/2828650sensors","detected_arxiv_id":null,"ref_index":60,"audited_at":"2026-05-19T22:22:21.972677Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1007/s11227-023-05763-6/metrics' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1007/s11227-023-05763-6/metrics","detected_arxiv_id":null,"ref_index":96,"audited_at":"2026-05-19T22:22:21.972677Z"}],"snapshot_sha256":"c647d884420ee2424b2c3365613ab2d3234512c2df6df56c000b1fe6f4a58764"},"events":[{"event_id":3356,"event_type":"pith.integrity.v1","payload_sha256":"d0e6a8585d6992507bc2958185d0d513097c0b127b9b8254eb5baeaecec2e2b6","signature_b64":"EzFOwNSZsfBQQq117tdE3S36mWTV0iWmuK9Weqmz3SVB2VMwn8yu2Ydy+l1tAgD7FY+oLdq6if6Lqrvs4BphDA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.778992+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-030-66922-5_18/coverin) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Shanshan Zhao, Shancang Li, Fuzhong Li, Wuping Zhang, and Muddesar Iqbal. 2021. Blockchain-Enabled User Authentication in Zero Trust Internet of Things.Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommuni","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"ref_index":120,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Shanshan Zhao, Shancang Li, Fuzhong Li, Wuping Zhang, and Muddesar Iqbal. 2021. Blockchain-Enabled User Authentication in Zero Trust Internet of Things.Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommuni","reconstructed_doi":"10.1007/978-3-030-66922-5_18/coverin"},"severity":"advisory","ref_index":120,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-030-66922-5_18/coverin","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4cba9225848ec586bd9f01dc2dc56cb6c4bfd9363559f8a49267cab37a5a3b31","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3355,"event_type":"pith.integrity.v1","payload_sha256":"400c79c4feef9343f1b89283f7877ce736af4d301c38ea7392ef9b3b00e64d2a","signature_b64":"u3ZXlWfkBPrWnsu6FyEx9PX7unuSAIpikIUhCVrkIyRBhlkpveeC04biBpXXaaiLxWgOseNvNPnpMo3tIe0+BA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.777870+00:00","payload":{"note":"Identifier '10.1007/978-981-15-8083-3_5/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Xiangshuai Yan and Huijuan Wang. 2020. Survey on Zero-Trust Network Security.Communications in Computer and Information Science1252 CCIS, unknown (2020), 50–60. doi:10.1007/978-981-15-8083-3_5/COVER","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"doi":"10.1007/978-981-15-8083-3_5/cover","arxiv_id":null,"ref_index":111,"raw_excerpt":"Xiangshuai Yan and Huijuan Wang. 2020. Survey on Zero-Trust Network Security.Communications in Computer and Information Science1252 CCIS, unknown (2020), 50–60. doi:10.1007/978-981-15-8083-3_5/COVER","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":111,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-981-15-8083-3_5/cover","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"631fc1f603e9dcc1aa94d0374670c636b090ac21f8be6c2dfc385848413b66c5","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3354,"event_type":"pith.integrity.v1","payload_sha256":"1559b78317e5793e1eb9cea9d03d42dd59d7d96782cb9825f7ae760cfbb42726","signature_b64":"fG5ZddP/hYcbLEr1wC1EW8O1YGsqThCpfbvWHQJfSpsMnYBCSatKoSOfOu5YSb1/FkJE37pm6XlTTVQZ0g3IDg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.776677+00:00","payload":{"note":"Identifier '10.1007/978-3-030-79725-6_18/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Minoru Uehara. 2021. Zero Trust Security in the Mist Architecture.Lecture Notes in Networks and Systems278, unknown (2021), 185–194. doi:10.1007/978-3-030-79725-6_18/COVER","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"doi":"10.1007/978-3-030-79725-6_18/cover","arxiv_id":null,"ref_index":104,"raw_excerpt":"Minoru Uehara. 2021. Zero Trust Security in the Mist Architecture.Lecture Notes in Networks and Systems278, unknown (2021), 185–194. doi:10.1007/978-3-030-79725-6_18/COVER","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":104,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-030-79725-6_18/cover","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"56424f0b4afd56d01c935d8ac9d3e924999a0099bc68e31871496a6b241356a5","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3353,"event_type":"pith.integrity.v1","payload_sha256":"92f927e9af713d72bc91e52367ef80ef29839a73a9a245d8f51e4b190f2749c8","signature_b64":"bB4e+WTBOolCMITDqV9NP/faJ03s1M/2gQhNSG9enpl/PmhzJ9IG7ni6i1319zy/Q5MZ22BKH2/ac+k9+KJ8Ag==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.775429+00:00","payload":{"note":"Identifier '10.1007/s11227-023-05763-6/metrics' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, and Mohammad Shabaz. 2023. Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model.Journ","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"doi":"10.1007/s11227-023-05763-6/metrics","arxiv_id":null,"ref_index":96,"raw_excerpt":"Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, and Mohammad Shabaz. 2023. Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model.Journal of Supercomputingunknown, unknown (11 2023), 1–27. doi:10.1007/S11227-023-05763-6/METRICS","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":96,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/s11227-023-05763-6/metrics","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"cbabc4824b6667b2394368923db36cf8d5c330e371798d0d8f4906c7c8821af6","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3352,"event_type":"pith.integrity.v1","payload_sha256":"54a9f8b3485194a0f238688e953df23b11b3d6448838048a65a420fa7c43f1a8","signature_b64":"+5cE3K1+WpN9hACTmdsRWsHr+Qh3o909JtBfhu6Zenywx13AHCEz/5DCjsTbqJHj85CAceIgOdq9C32WTPnLBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.774164+00:00","payload":{"note":"Identifier '10.1063/5.0127923/2895782' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Irza Hanie Abu Samah, Intan Maizura Abd Rashid, Abdul Shukor Shamsudin, Wan Ahmad Fauzi Wan Husain, Mohammad Harith Amlus, and Hariri Hamzah. 2023. Fundamental of zero trust among digital employees in migration to industry 4.0: Cyber securi","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"doi":"10.1063/5.0127923/2895782","arxiv_id":null,"ref_index":91,"raw_excerpt":"Irza Hanie Abu Samah, Intan Maizura Abd Rashid, Abdul Shukor Shamsudin, Wan Ahmad Fauzi Wan Husain, Mohammad Harith Amlus, and Hariri Hamzah. 2023. Fundamental of zero trust among digital employees in migration to industry 4.0: Cyber security and movement to iot in Malaysian perspectives.AIP Conference Proceedings2608, unknown (6 2023), unknown. Issue 1. doi:10.1063/5.0127923/2895782","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":91,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1063/5.0127923/2895782","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"e1b59869926c14cea06973d2d06a5e7559f43d20a30612728875d01cec30bef6","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3351,"event_type":"pith.integrity.v1","payload_sha256":"6c1c9de342c109ac932562478a2d325b8ec91b3fc10395214cca2689e73ea2fb","signature_b64":"EzBW/fLxrO6g1G3p4O/xji+SNlGQ0oCYQ/59xkNT9ciaIeGs/+o1XhSZpZvDJfdqK7gPv7po03X4Wa/kMGloCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.772705+00:00","payload":{"note":"Identifier '10.1007/s10796-021-10199-5/figures/6' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Shan Li, Muddesar Iqbal, and Neetesh Saxena. 2022. Future Industry Internet of Things with Zero-trust Security.Information Systems Frontiers unknown, unknown (3 2022), 1–14. doi:10.1007/S10796-021-10199-5/FIGURES/6","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"doi":"10.1007/s10796-021-10199-5/figures/6","arxiv_id":null,"ref_index":65,"raw_excerpt":"Shan Li, Muddesar Iqbal, and Neetesh Saxena. 2022. Future Industry Internet of Things with Zero-trust Security.Information Systems Frontiers unknown, unknown (3 2022), 1–14. doi:10.1007/S10796-021-10199-5/FIGURES/6","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":65,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/s10796-021-10199-5/figures/6","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"43f900b74f400e64851d00d6b109c5a5c5d1f00e2dc264cf0e04297e2ed4bf4e","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3350,"event_type":"pith.integrity.v1","payload_sha256":"eba9133a871b840b5d4ade41b09eb26e2c256385f957603ba201f1c22d2b72e0","signature_b64":"DXIrhmo88Wcnoh2RGqqNAYYtV3g32PvmoR7xISl9/nVorEF/Tgb6udfMCft1Ktgt/vsKDlYOqT3173QWO4nFAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.771497+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1063/5.0110599/2828650sensors) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Vijaya Bhaskar Kondaveety, Hemraj Lamkuche, and Suneel Prasad. 2022. A zero trust architecture for next generation automobiles.AIP Conference Proceedings2519, unknown (10 2022), unknown. Issue 1. doi:10.1063/5.0110599/2828650 sensors connec","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"ref_index":60,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Vijaya Bhaskar Kondaveety, Hemraj Lamkuche, and Suneel Prasad. 2022. A zero trust architecture for next generation automobiles.AIP Conference Proceedings2519, unknown (10 2022), unknown. Issue 1. doi:10.1063/5.0110599/2828650 sensors connec","reconstructed_doi":"10.1063/5.0110599/2828650sensors"},"severity":"advisory","ref_index":60,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1063/5.0110599/2828650sensors","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"4bb14dc7fdfc792db52c4bb1a249d577c79d358a0922ddc1c3337c975b8fc9a6","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3349,"event_type":"pith.integrity.v1","payload_sha256":"7fc9cff67f0899a1f97d817616bff0ea4cf70192aee14629df18176b0c60a04d","signature_b64":"hgQdikSuE3M5tC4cqPzFzuDwjTahhH26Uz2bBLsvdm/W2o/rvtSnxlVs5wIA+erwhAUAFw6YBeMELO73lS2DBg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.770178+00:00","payload":{"note":"Identifier '10.1007/978-981-99-1051-9_21/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"S. Kailash, Yuvaraj, and Saswati Mukherjee. 2023. Zero Trust Framework in Integrated Cloud Edge IoT Environment.Lecture Notes in Electrical Engineering1021 LNEE, unknown (2023), 331–342. doi:10.1007/978-981-99-1051-9_21/COVER","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"doi":"10.1007/978-981-99-1051-9_21/cover","arxiv_id":null,"ref_index":56,"raw_excerpt":"S. Kailash, Yuvaraj, and Saswati Mukherjee. 2023. Zero Trust Framework in Integrated Cloud Edge IoT Environment.Lecture Notes in Electrical Engineering1021 LNEE, unknown (2023), 331–342. doi:10.1007/978-981-99-1051-9_21/COVER","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":56,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-981-99-1051-9_21/cover","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"a7f91a8369626ec9f60d153571e3a1b5a8372653e35ba35d49d207d6b7096f00","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3348,"event_type":"pith.integrity.v1","payload_sha256":"e65b91441a5573910eedc1901db6c514abbfb292314ac4432aae1ec4796e6714","signature_b64":"4py4eu7I4SBW0EuX7qeKUGmhBxxZI6/Ozc9Qr40Y7dOZWJ8JaMsPZ7khl/VMLriM1jTrer4tEk14cHAr9DkmCg==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.768937+00:00","payload":{"note":"Identifier '10.1007/978-3-031-20738-9_145/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Wenhua Huang, Xuemin Xie, Ziying Wang, and Jingyu Feng. 2023. A Zero Trust and Attribute-Based Encryption Scheme for Dynamic Access Control in Power IoT Environments.Lecture Notes on Data Engineering and Communications Technologies153, unkn","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"doi":"10.1007/978-3-031-20738-9_145/cover","arxiv_id":null,"ref_index":51,"raw_excerpt":"Wenhua Huang, Xuemin Xie, Ziying Wang, and Jingyu Feng. 2023. A Zero Trust and Attribute-Based Encryption Scheme for Dynamic Access Control in Power IoT Environments.Lecture Notes on Data Engineering and Communications Technologies153, unknown (2023), 1338–1345. doi:10.1007/978-3-031-20738-9_145/COVER","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":51,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-031-20738-9_145/cover","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"290b219de1b7b119bba21843edf40da2e22d4f5660ff4148e58aeb264bc69930","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3347,"event_type":"pith.integrity.v1","payload_sha256":"23fed48b659ea80c9e1c3ecc2cea129d8e274af7be4c44fc90d7a252da3ec8ba","signature_b64":"Tqkxdbm6u+UqeOBtGKhT5KIW+yO2CQgMoc0B4Zv2ehWqRLCDPHRW/6fp0NqAgaJRKEYct7NcBLCdqYne9X8FCQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.767585+00:00","payload":{"note":"Identifier '10.1007/978-3-031-36625-3_31/cover' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Zhi hua Wang, Ming hui Jin, Lin Jiang, Chen jia Feng, Jing yi Cao, and Zhang Yun. 2023. Secure Access Method of Power Internet of Things Based on Zero Trust Architecture.Lecture Notes in Computer Science (including subseries Lecture Notes i","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"doi":"10.1007/978-3-031-36625-3_31/cover","arxiv_id":null,"ref_index":50,"raw_excerpt":"Zhi hua Wang, Ming hui Jin, Lin Jiang, Chen jia Feng, Jing yi Cao, and Zhang Yun. 2023. Secure Access Method of Power Internet of Things Based on Zero Trust Architecture.Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)13969 LNCS, unknown (2023), 386–399. doi:10.1007/978-3-031-36625-3_31/COVER","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":50,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-031-36625-3_31/cover","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"d81eb81328b1df95df52430100a78a48ebcb3eea46f74411551f2098ef5f0f65","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":3346,"event_type":"pith.integrity.v1","payload_sha256":"4bada840cb2f7a4ed6e0116c7ee0837ae1b24aae22feebf3f247a481d5c6b2c1","signature_b64":"4Ho2ELiyE+BC7HhnPC4aLFmwMGlbnAUSZXREUrc+ntoMVE/816eeMcrr5qbnOEK95sZqUX9Z2ELNAFzS2lXqDQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T22:22:24.765722+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/978-3-031-42924-8_14/coverin) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Morgan Morgak Gofwen, Bartholomew Idoko, and John Bush Idoko. 2023. Application of Zero-Trust Networks in e-Health Internet of Things (IoT) Deployments.Studies in Computational Intelligence1115, unknown (2023), 209–233. doi:10.1007/978-3-03","arxiv_id":"2604.24205","detector":"doi_compliance","evidence":{"ref_index":46,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Morgan Morgak Gofwen, Bartholomew Idoko, and John Bush Idoko. 2023. Application of Zero-Trust Networks in e-Health Internet of Things (IoT) Deployments.Studies in Computational Intelligence1115, unknown (2023), 209–233. doi:10.1007/978-3-03","reconstructed_doi":"10.1007/978-3-031-42924-8_14/coverin"},"severity":"advisory","ref_index":46,"audited_at":"2026-05-19T22:22:21.972677Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/978-3-031-42924-8_14/coverin","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"9b41103dcc255da3e04447f610a03ca9d71e29447186b4d9ad4ba0316d88fd7b","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2604.24205/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}