{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:11:26Z","timestamp":1776283886363,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016311","name":"Arm","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100016311","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472106","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Key Distribution in Dynamically Reconfigurable and Self-Organizing Aero-Physical Cyber Systems"],"prefix":"10.1109","author":[{"given":"Yeghisabet","family":"Alaverdyan","sequence":"first","affiliation":[{"name":"Institute for Informatics and Automation Problems of NAS RA,EKENG CJSC,Yerevan,Armenia"}]},{"given":"Vahagn","family":"Poghosyan","sequence":"additional","affiliation":[{"name":"Institute for Informatics and Automation Problems of NAS RA,Synopsys Armenia CJS,Yerevan,Armenia"}]},{"given":"Suren","family":"Poghosyan","sequence":"additional","affiliation":[{"name":"Institute for Informatics and Automation Problems of NAS RA,Yerevan,Armenia"}]},{"given":"Grigor","family":"Alaverdyan","sequence":"additional","affiliation":[{"name":"Institute of Physics at the Yerevan State University,Yerevan,Armenia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1134\/S106423071201008X"},{"issue":"8","key":"ref2","first-page":"2445","article-title":"Multi-agent machinery in construction of cognitive systems","volume":"20","author":"Alaverdyan","year":"2022","journal-title":"Journal of NeuroQuantology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1063\/5.0135806"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1139\/dsa-2023-0039"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1134\/s0361768823090086"},{"issue":"2","key":"ref6","first-page":"248","article-title":"False data injection attack and its countermeasures in wireless sensor networks","volume":"82","author":"Jeba","year":"2012","journal-title":"European Journal of Scientific Research"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.020774"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2018.8569730"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2888821"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.51408\/csit2023_09"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2021.2022035"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-7644-5_4"},{"key":"ref15","first-page":"221","article-title":"Parastrophes of quasigroups","volume":"23","author":"Dudek","year":"2015","journal-title":"Quasigroups and Related Systems"},{"key":"ref16","first-page":"95","article-title":"Characterization of quasigroups and loops","volume":"1","author":"Prasad","year":"2013","journal-title":"International Journal of Scientific and Innovative Mathematical Research (IJSIMR)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2021.2022035"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"ref19","first-page":"537","article-title":"Advances in Cryptology \u2013 CRYPTO 2017","volume-title":"Identity-Based Encryption from the Diffie-Hellman Assumption","volume":"10401","author":"D\u00f6ttling","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-024-09527-0"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472106.pdf?arnumber=11472106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:23:02Z","timestamp":1776280982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472106","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}