{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:35:42Z","timestamp":1764174942717,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T00:00:00Z","timestamp":1600992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Corporate and Information Services, NTG of Australia.","award":["1234"],"award-info":[{"award-number":["1234"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,25]]},"DOI":"10.1145\/3414045.3415945","type":"proceedings-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T01:54:28Z","timestamp":1602122068000},"page":"43-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["BioUAV"],"prefix":"10.1145","author":[{"given":"Shivani Bharatbhai","family":"Patel","sequence":"first","affiliation":[{"name":"Nirma University, Ahmedabad, Gujarat, India"}]},{"given":"Hamza Abubakar","family":"Kheruwala","sequence":"additional","affiliation":[{"name":"Nirma University, Ahmedabad, Gujarat, India"}]},{"given":"Mamoun","family":"Alazab","sequence":"additional","affiliation":[{"name":"Charles Darwin University, NT, Casuarina, Australia"}]},{"given":"Nikunj","family":"Patel","sequence":"additional","affiliation":[{"name":"Nirma University, Ahmedabad, Gujarat, India"}]},{"given":"Raj","family":"Damani","sequence":"additional","affiliation":[{"name":"Nirma University, Ahmedabad, Gujarat, India"}]},{"given":"Pronaya","family":"Bhattacharya","sequence":"additional","affiliation":[{"name":"Nirma University, Ahmedabad, Gujarat, India"}]},{"given":"Sudeep","family":"Tanwar","sequence":"additional","affiliation":[{"name":"Nirma University, Ahmedabad, Gujarat, India"}]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Thapar Institute of Engineering and Technology, Patiala, Punjab, India"}]}],"member":"320","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"volume-title":"FVC 2002","year":"2002","key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. FVC 2002 , Fingerprint Verification Database, http:\/\/bias.csr.unibo.it\/fvc 2002 \/databases.asp.. Accessed: 2020-06-04. [n.d.]. FVC 2002, Fingerprint Verification Database, http:\/\/bias.csr.unibo.it\/fvc2002\/databases.asp.. Accessed: 2020-06-04."},{"key":"e_1_3_2_1_2_1","volume-title":"PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. Computer Communications","author":"Alladi Tejasvi","year":"2020","unstructured":"Tejasvi Alladi , Vinay Chamola , Neeraj Kumar , 2020 . PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. Computer Communications (2020). Tejasvi Alladi, Vinay Chamola, Neeraj Kumar, et al. 2020. PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. Computer Communications (2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"S. Anwar V. K. Shukla S. S. Rao B. K. Sharma and P. Sharma. 2019. Framework for Financial Auditing Process Through Blockchain Technology using Identity Based Cryptography. In 2019 Sixth HCT Information Technology Trends (ITT) Ras Al Khaimah United Arab Emirates. 099--103.  S. Anwar V. K. Shukla S. S. Rao B. K. Sharma and P. Sharma. 2019. Framework for Financial Auditing Process Through Blockchain Technology using Identity Based Cryptography. In 2019 Sixth HCT Information Technology Trends (ITT) Ras Al Khaimah United Arab Emirates. 099--103.","DOI":"10.1109\/ITT48889.2019.9075120"},{"key":"e_1_3_2_1_4_1","unstructured":"P. Bhattacharya S. Tanwar U. Bodke S. Tyagi and N. Kumar. 2019. BinDaaS: Blockchain-Based Deep-Learning as-a-Service in Healthcare 4.0 Applications. IEEE Transactions on Network Science and Engineering (2019) 1--1.  P. Bhattacharya S. Tanwar U. Bodke S. Tyagi and N. Kumar. 2019. BinDaaS: Blockchain-Based Deep-Learning as-a-Service in Healthcare 4.0 Applications. IEEE Transactions on Network Science and Engineering (2019) 1--1."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29407-6_57"},{"key":"e_1_3_2_1_6_1","article-title":"Dual buffers optical based packet switch incorporating arrayed waveguide gratings","volume":"7","author":"Bhattacharya Pronaya","year":"2019","unstructured":"Pronaya Bhattacharya , Amod Kumar Tiwari , and Rajiv Srivastava . 2019 . Dual buffers optical based packet switch incorporating arrayed waveguide gratings . Journal of Engineering Research 7 , 1 (2019). Pronaya Bhattacharya, Amod Kumar Tiwari, and Rajiv Srivastava. 2019. Dual buffers optical based packet switch incorporating arrayed waveguide gratings. Journal of Engineering Research 7, 1 (2019).","journal-title":"Journal of Engineering Research"},{"key":"e_1_3_2_1_7_1","article-title":"Optical Data Centers Router Design with Fiber Delay Lines and Negative Acknowledgement","volume":"8","author":"Bhattacharya Pronaya","year":"2020","unstructured":"Pronaya Bhattacharya , Amod Kumar Tiwari , and Rajiv Srivastava . 2020 . Optical Data Centers Router Design with Fiber Delay Lines and Negative Acknowledgement . Journal of Engineering Research 8 , 2 (2020). Pronaya Bhattacharya, Amod Kumar Tiwari, and Rajiv Srivastava. 2020. Optical Data Centers Router Design with Fiber Delay Lines and Negative Acknowledgement. Journal of Engineering Research 8, 2 (2020).","journal-title":"Journal of Engineering Research"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981415"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2977533"},{"volume-title":"Secure Communications in Unmanned Aerial Vehicle Network","author":"He Shuangyu","key":"e_1_3_2_1_10_1","unstructured":"Shuangyu He , Qianhong Wu , Jingwen Liu , Wei Hu , Bo Qin , and Ya-Nan Li. 2017. Secure Communications in Unmanned Aerial Vehicle Network . In Information Security Practice and Experience, Joseph K. Liu and Pierangela Samarati (Eds.). Springer International Publishing , Cham , 601--620. Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, and Ya-Nan Li. 2017. Secure Communications in Unmanned Aerial Vehicle Network. In Information Security Practice and Experience, Joseph K. Liu and Pierangela Samarati (Eds.). Springer International Publishing, Cham, 601--620."},{"key":"e_1_3_2_1_11_1","unstructured":"Y. Hsu and R. Gau. 2020. Reinforcement Learning-based Collision Avoidance and Optimal Trajectory Planning in UAV Communication Networks. IEEE Transactions on Mobile Computing (2020) 1--1.  Y. Hsu and R. Gau. 2020. Reinforcement Learning-based Collision Avoidance and Optimal Trajectory Planning in UAV Communication Networks. IEEE Transactions on Mobile Computing (2020) 1--1."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.035"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3369-3_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931881"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.023"},{"volume-title":"Unmanned Aerial Vehicles in Smart Cities","author":"Mishra Kamta Nath","key":"e_1_3_2_1_17_1","unstructured":"Kamta Nath Mishra . 2020. An efficient palm-dorsa-based approach for vein image enhancement and feature extraction in cloud computing environment . In Unmanned Aerial Vehicles in Smart Cities . Springer , 85--106. Kamta Nath Mishra. 2020. An efficient palm-dorsa-based approach for vein image enhancement and feature extraction in cloud computing environment. In Unmanned Aerial Vehicles in Smart Cities. Springer, 85--106."},{"key":"e_1_3_2_1_18_1","first-page":"1900","article-title":"Provably secure authenticated key agreement scheme for smart grid","volume":"9","author":"Odelu Vanga","year":"2018","unstructured":"Vanga Odelu , Ashok Kumar Das , Mohammad Wazid , and Mauro Conti . 2018 . Provably secure authenticated key agreement scheme for smart grid . IEEE Transactions on Smart Grid 9 , 3 (2018), 1900 -- 1910 . Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, and Mauro Conti. 2018. Provably secure authenticated key agreement scheme for smart grid. IEEE Transactions on Smart Grid 9, 3 (2018), 1900--1910.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20113015"},{"key":"e_1_3_2_1_20_1","unstructured":"S. B. Patel P. Bhattacharya S. Tanwar and N. Kumar. 2020. KiRTi: A Blockchain-based Credit Recommender System for Financial Institutions. IEEE Transactions on Network Science and Engineering (2020) 1--1.  S. B. Patel P. Bhattacharya S. Tanwar and N. Kumar. 2020. KiRTi: A Blockchain-based Credit Recommender System for Financial Institutions. IEEE Transactions on Network Science and Engineering (2020) 1--1."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39445-5_50"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Amany Sarhan and Ahmed Ramadan. 2020. Continuous User Authentication on Touchscreen Using Behavioral Biometrics Utilizing Machine Learning Approaches. In Handbook of Research on Multimedia Cyber Security. IGI Global 243--281.  Amany Sarhan and Ahmed Ramadan. 2020. Continuous User Authentication on Touchscreen Using Behavioral Biometrics Utilizing Machine Learning Approaches. In Handbook of Research on Multimedia Cyber Security. IGI Global 243--281.","DOI":"10.4018\/978-1-7998-2701-6.ch013"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3084030.3084031"},{"key":"e_1_3_2_1_24_1","volume-title":"Ultra-high dimensional variable screening via Gram-Schmidt orthogonalization. Computational Statistics","author":"Wang Huiwen","year":"2020","unstructured":"Huiwen Wang , Ruiping Liu , Shanshan Wang , Zhichao Wang , and Gilbert Saporta . 2020. Ultra-high dimensional variable screening via Gram-Schmidt orthogonalization. Computational Statistics ( 2020 ), 1--18. Huiwen Wang, Ruiping Liu, Shanshan Wang, Zhichao Wang, and Gilbert Saporta. 2020. Ultra-high dimensional variable screening via Gram-Schmidt orthogonalization. Computational Statistics (2020), 1--18."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933576"},{"volume-title":"2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","author":"Zhang X.","key":"e_1_3_2_1_26_1","unstructured":"X. Zhang , Y. Dai , and X. Xu . 2017. Android-based multimodal biometric identification system using feature level fusion . In 2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS) , Xiamen, China. 120--124. X. Zhang, Y. Dai, and X. Xu. 2017. Android-based multimodal biometric identification system using feature level fusion. In 2017 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Xiamen, China. 120--124."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2838540"}],"event":{"name":"MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"London United Kingdom","acronym":"MobiCom '20"},"container-title":["Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3414045.3415945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3414045.3415945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:38Z","timestamp":1750199918000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3414045.3415945"}},"subtitle":["blockchain-envisioned framework for digital identification to secure access in next-generation UAVs"],"short-title":[],"issued":{"date-parts":[[2020,9,25]]},"references-count":27,"alternative-id":["10.1145\/3414045.3415945","10.1145\/3414045"],"URL":"https:\/\/doi.org\/10.1145\/3414045.3415945","relation":{},"subject":[],"published":{"date-parts":[[2020,9,25]]},"assertion":[{"value":"2020-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}