{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:42:34Z","timestamp":1772822554057,"version":"3.50.1"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2017,3,1]]},"DOI":"10.1109\/tsc.2015.2459709","type":"journal-article","created":{"date-parts":[[2015,7,22]],"date-time":"2015-07-22T18:28:10Z","timestamp":1437589690000},"page":"165-175","source":"Crossref","is-referenced-by-count":72,"title":["A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification"],"prefix":"10.1109","volume":"10","author":[{"given":"Anjia","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Joonsang","family":"Baek","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_17"},{"key":"ref11","first-page":"548","article-title":"Hierarchical Id-based cryptography","volume":"2501","author":"gentry","year":"0","journal-title":"Proc 8th Int Conf Theory Appl Cryptol Inf Security Adv Cryptol"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2514\/6.2004-6263"},{"key":"ref13","first-page":"1","article-title":"Localization algorithms for multilateration (MLAT) systems in airport surface surveillance","author":"gaviria","year":"0","journal-title":"Signal Image Video Process"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-642-17226-7_15","article-title":"From the internet of computers to the internet of things","author":"mattern","year":"2010","journal-title":"From Active Data Management to Event-Based Systems and More"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.001"},{"key":"ref16","first-page":"1","article-title":"Identification of ADS-B system vulnerabilities and threats","author":"purton","year":"0","journal-title":"Proc Australasian Transport Research Forum"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2010.5655382"},{"key":"ref18","first-page":"1","article-title":"A framework for securing future E-enabled aircraft navigation and surveillance","author":"sampigethaya","year":"0","journal-title":"Proc AIAA Infotech Aerospace Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2006.1655886"},{"key":"ref4","first-page":"236","article-title":"Fast batch verification for modular exponentiation and digital signatures","volume":"1403","author":"bellare","year":"0","journal-title":"Proc Conf Theory Appl Cryptographic Tech Adv Cryptol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_14"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref8","article-title":"A data authentication solution of ADS-B system based on x.509 certificate","author":"feng","year":"0","journal-title":"Proc 27th Int Congr Aeronaut Sci"},{"key":"ref7","article-title":"Ghost in the air (traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices","author":"costin","year":"0","journal-title":"Black Hat USA"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2013.61"},{"key":"ref9","first-page":"309","article-title":"Practical short signature batch verification","volume":"5473","author":"ferrara","year":"0","journal-title":"Proc Cryptographers' Track RSA Conf Topics Cryptology"},{"key":"ref1","year":"0"},{"key":"ref20","first-page":"253","article-title":"Experimental analysis of attacks on next generation air traffic communication","author":"sch\u00e4fer","year":"0","journal-title":"Proc Int Conf Appl Cryptography Network Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732202"},{"key":"ref21","article-title":"Security of ADS-B: State of the art and beyond","author":"strohmeier","year":"0"},{"key":"ref24","article-title":"Can cryptography secure next generation air traffic surveillance?","author":"wesson","year":"0","journal-title":"IEEE Security Privacy Mag"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6815901"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11496618_18"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/7893838\/07164319.pdf?arnumber=7164319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:45Z","timestamp":1633919685000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7164319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,1]]},"references-count":25,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2015.2459709","relation":{},"ISSN":["1939-1374"],"issn-type":[{"value":"1939-1374","type":"print"}],"subject":[],"published":{"date-parts":[[2017,3,1]]}}}