{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:05:14Z","timestamp":1768835114110,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508083","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"64-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions"],"prefix":"10.1145","author":[{"given":"Mostefa","family":"Kara","sequence":"first","affiliation":[{"name":"LIAP Laboratory, El Oued University, PO Box 789, El Oued 39000, El Oued, Algeria, Algeria"}]},{"given":"Abdelkader","family":"Laouid","sequence":"additional","affiliation":[{"name":"LIAP Laboratory, El Oued University, PO Box 789, El Oued 39000, El Oued, Algeria, Algeria"}]},{"given":"Ahcene","family":"Bounceur","sequence":"additional","affiliation":[{"name":"Lab-STICC UMR CNRS, University of Western Brittany UBO, Brest 6285, France, France"}]},{"given":"Mohammad","family":"Hammoudeh","sequence":"additional","affiliation":[{"name":"School of Computing, Mathematics and Digital Technology, Manchester Metropolitan University, Manchester, M1 5GD, UK, UK"}]},{"given":"Muath","family":"Alshaikh","sequence":"additional","affiliation":[{"name":"Computer Science Department, College of Computing and Informatics, Saudi Electronic University, 11673 Riyadh, Kingdom of Saudi Arabia, Saudi Arabia"}]},{"given":"Romaissa","family":"Kebache","sequence":"additional","affiliation":[{"name":"LIAP Laboratory, El Oued University, PO Box 789, El Oued 39000, El Oued, Algeria, Algeria"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94496-8_7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2537208"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4176"},{"key":"e_1_3_2_1_4_1","first-page":"70","article-title":"Cooperative GNSS authentication. Reliability from unreliable peers","volume":"8","author":"Heng LIANG","year":"2013","unstructured":"LIANG Heng , DANIE L\u00a0B Work , and GRAC E\u00a0XINGXIN Gao . 2013 . Cooperative GNSS authentication. Reliability from unreliable peers . Inside GNSS 8 (2013), 70 \u2013 75 . LIANG Heng, DANIEL\u00a0B Work, and GRACE\u00a0XINGXIN Gao. 2013. Cooperative GNSS authentication. Reliability from unreliable peers. Inside GNSS 8 (2013), 70\u201375.","journal-title":"Inside GNSS"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41445-018-0018-3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Mostefa Kara Abdelkader Laouid Muath AlShaikh Ahc\u00e8ne Bounceur and Mohammad Hammoudeh. 2021. Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol. Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 7 3(2021) 380\u2013387. http:\/\/journal.uad.ac.id\/index.php\/JITEKI\/article\/view\/22210  Mostefa Kara Abdelkader Laouid Muath AlShaikh Ahc\u00e8ne Bounceur and Mohammad Hammoudeh. 2021. Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol. Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 7 3(2021) 380\u2013387. http:\/\/journal.uad.ac.id\/index.php\/JITEKI\/article\/view\/22210","DOI":"10.26555\/jiteki.v7i3.22210"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11156750"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem, In The 4th International Conference on Future Networks and Distributed Systems (ICFNDS)","volume":"1","author":"Kara Mostefa","year":"2020","unstructured":"Mostefa Kara , Abdelkader Laouid , Reinhardt Euler , Mohammed\u00a0Amine Yagoub , Ahcene Bounceur , Mohammad Hammoudeh , and Saci Medileh . 2020 . A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem, In The 4th International Conference on Future Networks and Distributed Systems (ICFNDS) . ACM Digital Library 1 , 1 \u2013 6 . Mostefa Kara, Abdelkader Laouid, Reinhardt Euler, Mohammed\u00a0Amine Yagoub, Ahcene Bounceur, Mohammad Hammoudeh, and Saci Medileh. 2020. A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem, In The 4th International Conference on Future Networks and Distributed Systems (ICFNDS). ACM Digital Library 1, 1\u20136.","journal-title":"ACM Digital Library"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case","volume":"1","author":"Kara Mostefa","year":"2021","unstructured":"Mostefa Kara , Abdelkader Laouid , Mohammed\u00a0Amine Yagoub , Reinhardt Euler , Saci Medileh , Mohammad Hammoudeh , Amna Eleyan , and Ahc\u00e8ne Bounceur . 2021 . A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case . Expert Systems 1 (2021), 1 \u2013 10 . Mostefa Kara, Abdelkader Laouid, Mohammed\u00a0Amine Yagoub, Reinhardt Euler, Saci Medileh, Mohammad Hammoudeh, Amna Eleyan, and Ahc\u00e8ne Bounceur. 2021. A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case. Expert Systems 1(2021), 1\u201310.","journal-title":"Expert Systems"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21062057"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2804099"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2627552"},{"key":"e_1_3_2_1_13_1","first-page":"116","article-title":"Secure Communication System of Drone Service using Hybrid Cryptography over 4G\/LTE Network, In 2020 International Electronics Symposium (IES)","volume":"1","author":"Ronaldo Febby","year":"2020","unstructured":"Febby Ronaldo , Dadet Pramadihanto , and Amang Sudarsono . 2020 . Secure Communication System of Drone Service using Hybrid Cryptography over 4G\/LTE Network, In 2020 International Electronics Symposium (IES) . IEEEXplore 1 , 116 \u2013 122 . Febby Ronaldo, Dadet Pramadihanto, and Amang Sudarsono. 2020. Secure Communication System of Drone Service using Hybrid Cryptography over 4G\/LTE Network, In 2020 International Electronics Symposium (IES). IEEEXplore 1, 116\u2013122.","journal-title":"IEEEXplore"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897166"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.11003\/JPNT.2015.4.2.057"},{"key":"e_1_3_2_1_16_1","first-page":"177","article-title":"Secure communication in civil drones, In International Conference on Information Systems Security and Privacy","volume":"1","author":"Shoufan Abdulhadi","year":"2015","unstructured":"Abdulhadi Shoufan , Hassan AlNoon , and Joonsang Baek . 2015 . Secure communication in civil drones, In International Conference on Information Systems Security and Privacy . Information Systems Security and Privacy 1 , 177 \u2013 195 . Abdulhadi Shoufan, Hassan AlNoon, and Joonsang Baek. 2015. Secure communication in civil drones, In International Conference on Information Systems Security and Privacy. Information Systems Security and Privacy 1, 177\u2013195.","journal-title":"Information Systems Security and Privacy"},{"key":"e_1_3_2_1_17_1","first-page":"31","article-title":"Understanding security threats in consumer drones through the lens of the discovery quadcopter family, In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","volume":"1","author":"Valente Junia","year":"2017","unstructured":"Junia Valente and Alvaro\u00a0 A Cardenas . 2017 . Understanding security threats in consumer drones through the lens of the discovery quadcopter family, In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy . ACM Digital Library 1 , 31 \u2013 36 . Junia Valente and Alvaro\u00a0A Cardenas. 2017. Understanding security threats in consumer drones through the lens of the discovery quadcopter family, In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. ACM Digital Library 1, 31\u201336.","journal-title":"ACM Digital Library"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/UVS.2019.8658279"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-015-0699-5"},{"key":"e_1_3_2_1_20_1","first-page":"85","article-title":"A practical GPS location spoofing attack in road navigation scenario, In Proceedings of the 18th international workshop on mobile computing systems and applications","volume":"1","author":"Zeng Kexiong\u00a0Curtis","year":"2017","unstructured":"Kexiong\u00a0Curtis Zeng , Yuanchao Shu , Shinan Liu , Yanzhi Dou , and Yaling Yang . 2017 . A practical GPS location spoofing attack in road navigation scenario, In Proceedings of the 18th international workshop on mobile computing systems and applications . ACM Digital Library 1 , 85 \u2013 90 . Kexiong\u00a0Curtis Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, and Yaling Yang. 2017. A practical GPS location spoofing attack in road navigation scenario, In Proceedings of the 18th international workshop on mobile computing systems and applications. ACM Digital Library 1, 85\u201390.","journal-title":"ACM Digital Library"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_12"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","location":"Dubai United Arab Emirates","acronym":"ICFNDS 2021"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":21,"alternative-id":["10.1145\/3508072.3508083","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508083","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}