{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T01:19:38Z","timestamp":1778807978046,"version":"3.51.4"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"22","license":[{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005270","name":"University-Industry Collaborative Project of Fujian Provincial Department of Science and Technology","doi-asserted-by":"publisher","award":["2023H6012"],"award-info":[{"award-number":["2023H6012"]}],"id":[{"id":"10.13039\/501100005270","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012559","name":"Foundation of Guangxi Key Laboratory of Trusted Software","doi-asserted-by":"publisher","award":["KX202039"],"award-info":[{"award-number":["KX202039"]}],"id":[{"id":"10.13039\/501100012559","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,11,15]]},"DOI":"10.1109\/jiot.2024.3431879","type":"journal-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T20:52:57Z","timestamp":1722459177000},"page":"36858-36883","source":"Crossref","is-referenced-by-count":20,"title":["BAKAS-UAV: A Secure Blockchain-Assisted Authentication and Key Agreement Scheme for Unmanned Aerial Vehicles Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2543-9568","authenticated-orcid":false,"given":"Keke","family":"Huang","sequence":"first","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2601-9976","authenticated-orcid":false,"given":"Huidan","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications, Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2868-3398","authenticated-orcid":false,"given":"Changlu","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications, Center for Applied Mathematics of Fujian Province, Fujian Normal University, Fuzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jag.2013.05.011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103567"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794320"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2018.096226"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.10.007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2020.09.018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162738"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.06.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100552"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102870"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109626"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3591464"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3059656"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2976960"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3188769"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3033060"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.03.009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN49260.2020.9153239"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3163367"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12295"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3018778"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.12.005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3284216"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3048398"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142251"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3027147"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3117762"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3068410"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3248107"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142084"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"ref36","volume-title":"Python","year":"2023"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3285513"},{"key":"ref38","volume-title":"Raspberry4B: Raspberry pi 4 model B","year":"2023"},{"key":"ref39","volume-title":"Python cryptography toolkit (Pycrypto)","author":"Amk","year":"2023"},{"key":"ref40","volume-title":"Fast elliptic curve digital signatures","year":"2023"},{"key":"ref41","volume-title":"A bilinear pairing library for petlib","year":"2023"},{"key":"ref42","volume-title":"Cryptanalysis of physically unclonable functions","year":"2023"},{"key":"ref43","volume-title":"A Python implementation of fuzzy extractor","year":"2023"},{"key":"ref44","volume-title":"Truffle documentation","year":"2023"},{"key":"ref45","volume-title":"Ganache documentation","year":"2023"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10747044\/10618961.pdf?arnumber=10618961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:10:16Z","timestamp":1732666216000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10618961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,15]]},"references-count":45,"journal-issue":{"issue":"22"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3431879","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,15]]}}}