{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:27:23Z","timestamp":1771705643770,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tmc.2025.3607316","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T17:49:20Z","timestamp":1757353760000},"page":"2125-2140","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient iTreeKEM-Based Group Key Agreement Protocol for Flying Ad-Hoc Networks"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7638-4512","authenticated-orcid":false,"given":"Tianqi","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering (School of Cyber Science and Technology), Zhejiang Sci-Tech University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6414-3678","authenticated-orcid":false,"given":"Shijia","family":"Hong","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0519-9058","authenticated-orcid":false,"given":"Jian","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9513-9990","authenticated-orcid":false,"given":"Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, Fordham University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5451-8946","authenticated-orcid":false,"given":"Pandi","family":"Vijayakumar","sequence":"additional","affiliation":[{"name":"Professor and Dean, Department of Computer Science and Engineering, JJ College of Engineering and Technology, Tiruchirappalli, Tamil Nadu, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3673225"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110250"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3127436"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2725953"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2022.3221125"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3047872"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3305870"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3443622"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2943118"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3048398"},{"key":"ref11","first-page":"51","article-title":"Paxos made simple","author":"Lamport","year":"2001","journal-title":"ACM SIGACT News"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15979-4_2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07085-3_28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243747"},{"key":"ref15","article-title":"TreeKEM: Asynchronous decentralized key management for large dynamic groups a protocol proposal for messaging layer security (MLS)","author":"Bhargavan","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56784-2_9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00035"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560632"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_29"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484542"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2018.8569730"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3113321"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3287487"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3359240"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142251"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3465847"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3381432"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-014-9185-x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3414663"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3129631"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3275750"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108418"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845163"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3051273"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11345503\/11153679.pdf?arnumber=11153679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:10:01Z","timestamp":1770671401000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11153679\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":36,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3607316","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}