{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T18:46:16Z","timestamp":1779129976356,"version":"3.51.4"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080297","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"857-864","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption"],"prefix":"10.3103","volume":"53","author":[{"given":"N. N.","family":"Shenets","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7188_CR1","doi-asserted-by":"crossref","unstructured":"Tareque, H. and Shohrab, H., On the routing in flying ad-hoc networks, Proc. Federated Conf. on Computer Science and Information Systems, ACSIS, Lodz, 2015, vol. 5, pp. 1\u20139.","DOI":"10.15439\/2015F002"},{"key":"7188_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L. and Haas, Z.J., Securing ad-hoc networks, IEEE Network, 1999, vol. 13, pp. 24\u201330.","journal-title":"IEEE Network"},{"key":"7188_CR3","unstructured":"Bernstein, D.J., Curve25519: New Diffie-Hellman speed records. https:\/\/cr.yp.to\/ecdh\/curve25519-20051115.pdf. Accessed April 23, 2018."},{"key":"7188_CR4","unstructured":"Costello, C. and Longa, P., FourQ: Four-dimensional decompositions on a Q-curve over the Mersenne prime. https:\/\/eprint.iacr.org\/2015\/565.pdf. Accessed May 14, 2018."},{"key":"7188_CR5","unstructured":"Diego, F.A., Azarderakhsh, R., and Karabina, K., Efficient software implementation of laddering algorithms over binary elliptic curves. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-71501-8_5. Accessed April 28, 2018."},{"key":"7188_CR6","unstructured":"Masdari, M. and Barbin, J.P., Distributed certificate management in mobile ad-hoc networks. https:\/\/research.ijais.org\/volume1\/number1\/ijais12-450721.pdf. Accessed April 30, 2018."},{"key":"7188_CR7","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S0146411617080193","volume":"51","author":"N.N. Shenets","year":"2017","unstructured":"Shenets, N.N., Authentication in dynamic pear-to-pear networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936\u2013946.","journal-title":"Autom. Control Comput. Sci."},{"key":"7188_CR8","unstructured":"Shenets, N.N., Authentication protocol based on homomorphic secret sharing: new version, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2017, no. 4, pp. 102\u2013112."},{"key":"7188_CR9","unstructured":"Hongjun, W., ACORN: A lightweight authenticated cipher (v3). https:\/\/competitions.cr.yp.to\/round3\/ acornv3.pdf. Accessed June 1, 2018."},{"key":"7188_CR10","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., and Schlaaffer, M., Ascon v1.2 submission to the CAESAR competition. https:\/\/competitions.cr.yp.to\/round3\/asconv12.pdf. Accessed April 28, 2018."},{"key":"7188_CR11","unstructured":"Secure sensor network with Elliptic Curve cryptography, AES-128 encryption, Hamming code ECC. https:\/\/github.com\/earlephilhower\/sensy. Accessed April 29, 2018."},{"key":"7188_CR12","unstructured":"Pearce, C., Yin-Man, V.M., and Bertok, P., A secure communication protocol for ad-hoc wireless sensor networks. https:\/\/researchbank.rmit.edu.au\/eserv\/rmit:1605\/n2004002109.pdf. Accessed April March 8, 2018."},{"key":"7188_CR13","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., and Culler, D.E., SPINS: Security Protocols for Sensor Networks. http:\/\/www.netsec.ethz.ch\/publications\/papers\/spins-wine-journal.pdf. Accessed April 11, 2018."},{"key":"7188_CR14","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A., How to share a secret, Commun. ACM, 1979, vol. 22, pp. 612\u2013613.","journal-title":"Commun. ACM"},{"key":"7188_CR15","doi-asserted-by":"crossref","unstructured":"Feldman, P., A practical scheme for noninteractive verifiable secret sharing, Proc. 28th IEEE Symposium on Foundations of Computer Science (FOCS 87), 1987, pp. 427\u2013437.","DOI":"10.1109\/SFCS.1987.4"},{"key":"7188_CR16","unstructured":"Forsby, F., Digital certificates for the Internet of Things. http:\/\/www.diva-portal.org\/smash\/get\/diva2: 1153958\/FULLTEXT01.pdf. Accessed April 18, 2018."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080297.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080297","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080297.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:58:39Z","timestamp":1773611919000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7188"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080297","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"18 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}