{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T20:06:18Z","timestamp":1771790778897,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["NPRP-S-11-0109-180242"],"award-info":[{"award-number":["NPRP-S-11-0109-180242"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.1109\/tdsc.2021.3069428","type":"journal-article","created":{"date-parts":[[2021,3,30]],"date-time":"2021-03-30T20:34:48Z","timestamp":1617136488000},"page":"2709-2726","source":"Crossref","is-referenced-by-count":21,"title":["Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0974-3639","authenticated-orcid":false,"given":"Savio","family":"Sciancalepore","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, Eindhoven University of Technology (TU\/e), Eindhoven, AZ, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3324-3706","authenticated-orcid":false,"given":"Pietro","family":"Tedeschi","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Doha, Qatar"}]},{"given":"Ahmed","family":"Aziz","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University (HBKU), Doha, Qatar"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2014.12.010"},{"key":"ref3","article-title":"The global fleet revealed","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900632"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664257"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-57pt1r4","article-title":"Recommendation for Key Management Part 1: General","volume-title":"NIST","author":"Barker","year":"2016"},{"key":"ref7","article-title":"Open-source code of the implementation of Auth-AIS","year":"2021"},{"key":"ref10","article-title":"Technical characteristics for an automatic identification system using time division multiple access in the VHF maritime mobile frequency band","year":"2014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73655-6_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/OCEANS.2009.5422237"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/OCEANS.2018.8604561"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162320"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145867"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.2.10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3055259.3055261"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00773-018-0561-3"},{"key":"ref19","article-title":"Digital authentication strategies for the automated identification system","volume-title":"Proc. Midwest Instruction and Computing Symposium (MICS)","author":"Stewart"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2015.7311412"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/aerospace4040051"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2365951"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2017.8102003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2459709"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2934446"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.03.027"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450292"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.001"},{"key":"ref31","first-page":"1","article-title":"Bluetooth: With low energy comes low security","volume-title":"Proc. 7th USENIX Conf. Offensive Technol.","author":"Ryan"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.003"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.803864"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3219287"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.1999.5340513"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399350"},{"key":"ref39","article-title":"Implementation manual for IRIDIUM satellite communications service","year":"2021"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/0470867728"},{"issue":"2","key":"ref42","first-page":"2","article-title":"The TESLA broadcast authentication protocol","volume":"5","author":"Perrig","year":"2002","journal-title":"RSA Cryptobytes"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45853-0_9"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.17487\/rfc2104","article-title":"HMAC: Keyed-hashing for message authentication","volume-title":"RFC 2104","author":"Krawczyk","year":"1997"},{"key":"ref45","volume-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings","year":"2017"},{"key":"ref46","article-title":"UBX160 Daughterboard","year":"2021"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.032511.00097"},{"key":"ref48","article-title":"AIS receiver with GNURadio common blocks","year":"2021"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9821019\/09390297.pdf?arnumber=9390297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:21:25Z","timestamp":1704846085000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9390297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":44,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2021.3069428","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,1]]}}}