{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:30:36Z","timestamp":1766565036917,"version":"3.48.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1109\/isc266238.2025.11293274","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:28:12Z","timestamp":1766514492000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Self-Sovereign-Identity Management and On-Boarding Framework for UAV Swarm Environment"],"prefix":"10.1109","author":[{"given":"Tafseer","family":"Akhtar","sequence":"first","affiliation":[{"name":"Industrial Systems Institute, ATHENA Research Center"}]},{"given":"Christos","family":"Tselios","sequence":"additional","affiliation":[{"name":"Enebula BV,Amsterdam,Netherlands"}]},{"given":"Polyxeni","family":"Nakou","sequence":"additional","affiliation":[{"name":"Enebula BV,Amsterdam,Netherlands"}]},{"given":"Ilias","family":"Politis","sequence":"additional","affiliation":[{"name":"Industrial Systems Institute, ATHENA Research Center"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101469"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909530"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3319544"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2911672"},{"key":"ref5","article-title":"Robust smart card based password authentication scheme against smart card security breach","author":"Wang","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3116163"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"journal-title":"Using keycloak for gateway authentication and authorization","year":"2017","author":"Christie","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142251"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2019.8793027"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN52536.2021.9566025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3015862"},{"volume-title":"Hyperledger foundation. identus","year":"2025","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN57023.2022.10050998"}],"event":{"name":"2025 IEEE International Smart Cities Conference (ISC2)","start":{"date-parts":[[2025,10,6]]},"location":"Patras, Greece","end":{"date-parts":[[2025,10,9]]}},"container-title":["2025 IEEE International Smart Cities Conference (ISC2)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11293139\/11293247\/11293274.pdf?arnumber=11293274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T07:28:20Z","timestamp":1766561300000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11293274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isc266238.2025.11293274","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]}}}