{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T22:17:28Z","timestamp":1774477048441,"version":"3.50.1"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/msec.2025.3610295","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:40:01Z","timestamp":1760636401000},"page":"10-20","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity in Tactical Edge Networks"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6425-5403","authenticated-orcid":false,"given":"Kevin S.","family":"Chan","sequence":"first","affiliation":[{"name":"Networks, Cyber, and Computational Sciences Division, U.S. Army Combat Capabilities Development Command Army Research Laboratory (DEVCOM ARL), Adelphi, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7658-4503","authenticated-orcid":false,"given":"Frank T.","family":"Johnsen","sequence":"additional","affiliation":[{"name":"Strategic Analyses and Joint Systems Department, Norwegian Defence Research Establishment (FFI), Kjeller, Norway"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"A guide to fully homomorphic encryption","author":"Armknecht","year":"2015"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9420","volume-title":"RFC 9420 the messaging layer security (MLS) protocol","author":"Barnes","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1117\/12.3030949"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9781119892199"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/mts.2024.3372605"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3387108"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/milcom61039.2024.10773821"},{"key":"ref9","article-title":"A security perspective on the military application of edge computing","volume-title":"IST-208 Res. Symp.","author":"Mancini"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/milcom58377.2023.10356285"},{"key":"ref11","volume-title":"Science & technology trends 2023-2043: Across the physical, biological, and information domains","volume":"2","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3339056"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icmcis59922.2023.10253573"},{"key":"ref14","article-title":"Using the messaging layer security protocol to secure distributed C2","volume-title":"NATO IST-208 Res. Symp.","author":"Strand"},{"key":"ref15","volume-title":"IEEE Xplore author profile","author":"Swami","year":"2025"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8013\/11269917\/11205949.pdf?arnumber=11205949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T19:00:12Z","timestamp":1764270012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11205949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":15,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/msec.2025.3610295","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}