{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T07:16:32Z","timestamp":1764746192374,"version":"3.46.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T00:00:00Z","timestamp":1760918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,20]]},"DOI":"10.1109\/wimob66857.2025.11257492","type":"proceedings-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T18:45:02Z","timestamp":1764701102000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["SPARKS: A Serverless Protocol for Authentication and Resilient Key Sharing in UAV Networks"],"prefix":"10.1109","author":[{"given":"Timoth\u00e9","family":"Pitault","sequence":"first","affiliation":[{"name":"ENSEIRB-MATMECA, Bordeaux INP,France"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua,Padua,Italy"}]},{"given":"Federico","family":"Cor\u00f2","sequence":"additional","affiliation":[{"name":"University of Padua,Padua,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3105915"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.859470"},{"key":"ref3","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"annual design automation conference","author":"Suh","year":"2007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3033060"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3202265"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3188769"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISED.2018.8703993"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2018.00037"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob58348.2023.10187758"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-48464-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3224611"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61231-2_6"},{"volume-title":"The Tamarin Prover Manual: Book Version 0.9","year":"2023","author":"Kremer","key":"ref14"},{"year":"2023","key":"ref15","article-title":"Tamarin prover manual"},{"article-title":"Api design considerations: Initialization functions hurt","volume-title":"n.d.","year":"2025","key":"ref16"}],"event":{"name":"2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2025,10,20]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2025,10,22]]}},"container-title":["2025 21th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11253544\/11257435\/11257492.pdf?arnumber=11257492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T07:11:10Z","timestamp":1764745870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11257492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,20]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wimob66857.2025.11257492","relation":{},"subject":[],"published":{"date-parts":[[2025,10,20]]}}}