{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:09:21Z","timestamp":1757617761139,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819645657"},{"type":"electronic","value":"9789819645664"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4566-4_4","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T23:54:11Z","timestamp":1743551651000},"page":"56-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Decentralized Continuous Group Key Agreement for\u00a0UAV Ad-Hoc Network"],"prefix":"10.1007","author":[{"given":"Shijia","family":"Hong","sequence":"first","affiliation":[]},{"given":"Tianqi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Huijie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Mingdi","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Wenying","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.future.2022.10.012","volume":"140","author":"C Wang","year":"2023","unstructured":"Wang, C., Zhou, T., Shen, J., Wang, W., Zhou, X.: Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems. Futur. Gener. Comput. Syst. 140, 129\u2013137 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1016\/j.comnet.2022.109421","volume":"218","author":"C Tian","year":"2022","unstructured":"Tian, C., Jiang, Q., Li, T., Zhang, J., Xi, N., Ma, J.: Reliable PUF-based mutual authentication protocol for UAVS towards multi-domain environment. Comput. Netw. 218, 1389\u20131286 (2022)","journal-title":"Comput. Netw."},{"issue":"3","key":"4_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MWC.002.2100594","volume":"29","author":"Y Tan","year":"2022","unstructured":"Tan, Y., Liu, J., Kato, N.: Blockchain-based lightweight authentication for resilient UAV communications: architecture, scheme, and future directions. IEEE Wirel. Commun. 29(3), 24\u201331 (2022)","journal-title":"IEEE Wirel. Commun."},{"issue":"9","key":"4_CR4","doi-asserted-by":"publisher","first-page":"8601","DOI":"10.1109\/TMC.2024.3350885","volume":"23","author":"C Zhang","year":"2024","unstructured":"Zhang, C., et al.: UAV swarm-enabled collaborative secure relay communications with time-domain colluding eavesdropper. IEEE Trans. Mob. Comput. 23(9), 8601\u20138619 (2024)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Panjwani, S.: Tackling adaptive corruptions in multicast encryption protocols. In: Proceedings of the 4th Conference on Theory of Cryptography, pp. 21\u201340 (2007)","DOI":"10.1007\/978-3-540-70936-7_2"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Semal, B., Markantonakis, K., Akram, R.N.: A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In: Proceedings of the 37th Digital Avionics Systems Conference (DASC), pp. 1\u20138 (2018)","DOI":"10.1109\/DASC.2018.8569730"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Alwen, J., Coretti, S., Jost, D., Mularczyk, M.: Continuous group key agreement with active security. IACR Cryptol. ePrint Arch. (2020)","DOI":"10.1007\/978-3-030-64378-2_10"},{"issue":"2","key":"4_CR8","first-page":"2608","volume":"24","author":"C Wang","year":"2023","unstructured":"Wang, C., Shen, J., Vijayakumar, P., Gupta, B.B.: Attribute-based secure data aggregation for isolated IoT-enabled maritime transportation systems. IEEE Trans. Intell. Transp. Syst. 24(2), 2608\u20132617 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"18","key":"4_CR9","doi-asserted-by":"publisher","first-page":"16928","DOI":"10.1109\/JIOT.2022.3142251","volume":"9","author":"Y Tan","year":"2022","unstructured":"Tan, Y., Wang, J., Liu, J., Kato, N.: Blockchain-assisted distributed and lightweight authentication service for industrial unmanned aerial vehicles. IEEE Internet Things J. 9(18), 16928\u201316940 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"4_CR10","doi-asserted-by":"publisher","first-page":"7118","DOI":"10.1109\/TII.2021.3129631","volume":"18","author":"Z Xu","year":"2021","unstructured":"Xu, Z., Liang, W., Li, K.C., Xu, J., Zomaya, A.Y., Zhang, J.: A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for industry 5.0. IEEE Trans. Industr. Inf. 18(10), 7118\u20137127 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.ins.2019.06.067","volume":"503","author":"L Wang","year":"2019","unstructured":"Wang, L., Tian, Y., Zhang, D., Yanhua, L.: Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Inf. Sci. 503, 61\u201371 (2019)","journal-title":"Inf. Sci."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Kajita, K., Emura, K., Ogawa, K., Nojima, R., Ohtake, G.: Continuous group key agreement with flexible authorization and its applications. In: Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, pp. 3\u201313 (2023)","DOI":"10.1145\/3579987.3586570"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Alwen, J., et al.: Cocoa: concurrent continuous group key agreement. In: Proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 815\u2013844 (2022)","DOI":"10.1007\/978-3-031-07085-3_28"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Klein, K., et al.: Keep the dirt: tainted treekem, adaptively and actively secure continuous group key agreement. In: Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), pp. 268\u2013284 (2021)","DOI":"10.1109\/SP40001.2021.00035"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"4732","DOI":"10.1109\/TIFS.2023.3297905","volume":"18","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Zhu, T., Zhang, H., Xiong, P., Zhou, W.: Fedrecovery: differentially private machine unlearning for federated learning frameworks. IEEE Trans. Inf. Forensics Secur. 18, 4732\u20134746 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"4_CR16","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1109\/TSC.2024.3349784","volume":"17","author":"H Chen","year":"2024","unstructured":"Chen, H., Zhu, T., Liu, C., Shui, Yu., Zhou, W.: High-frequency matters: attack and defense for image-processing model watermarking. IEEE Trans. Serv. Comput. 17(4), 1565\u20131579 (2024)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"9","key":"4_CR17","first-page":"1536","volume":"23","author":"C Zhang","year":"2024","unstructured":"Zhang, C., et al.: UAV swarm-enabled collaborative secure relay communications with time-domain colluding eavesdropper. IEEE Trans. Veh. Technol. 23(9), 1536\u20131233 (2024)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"4_CR18","doi-asserted-by":"publisher","first-page":"7629","DOI":"10.1109\/TII.2020.3048398","volume":"17","author":"Y Tan","year":"2020","unstructured":"Tan, Y., Liu, J., Kato, N.: Blockchain-based key management for heterogeneous flying ad hoc network. IEEE Trans. Industr. Inf. 17(11), 7629\u20137638 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"11","key":"4_CR19","first-page":"14987","volume":"72","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., et al.: TAGKA: threshold authenticated group key agreement protocol against member disconnect for UANET. IEEE Trans. Veh. Technol. 72(11), 14987\u201315001 (2023)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Semal, B., Markantonakis, K., Akram, R.N.: A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks. In: Proceedings of the 37th Digital Avionics Systems Conference (DASC), pp. 1\u20138 (2018)","DOI":"10.1109\/DASC.2018.8569730"},{"issue":"8","key":"4_CR21","doi-asserted-by":"publisher","first-page":"6224","DOI":"10.1109\/JIOT.2021.3113321","volume":"9","author":"C Feng","year":"2022","unstructured":"Feng, C., Liu, B., Guo, Z., Yu, K., Qin, Z., Choo, K.: Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones. IEEE Internet Things J. 9(8), 6224\u20136238 (2022)","journal-title":"IEEE Internet Things J."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Cohn-Gordon, K., Cremers, C., Garratt, L., Millican, J., Milner, K.: On ends-to-ends encryption: asynchronous group messaging with strong security guarantees. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1802\u20131819 (2018)","DOI":"10.1145\/3243734.3243747"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4566-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T08:31:55Z","timestamp":1757147515000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4566-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819645657","9789819645664"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4566-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/ml4cs2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}