{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:26:45Z","timestamp":1760707605270},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540309123"},{"type":"electronic","value":"9783540316152"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11601494_10","type":"book-chapter","created":{"date-parts":[[2005,12,5]],"date-time":"2005-12-05T13:06:22Z","timestamp":1133787982000},"page":"113-127","source":"Crossref","is-referenced-by-count":19,"title":["Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Gergely","family":"\u00c1cs","sequence":"first","affiliation":[]},{"given":"Levente","family":"Butty\u00e1n","sequence":"additional","affiliation":[]},{"given":"Istv\u00e1n","family":"Vajda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"\u00c1cs, G., Butty\u00e1n, L., Vajda, I.: Provably Secure On-demand Source Routing in Mobile Ad\u00a0Hoc Networks. Technical Report, Budapest University of Technology and Economics (March 2005), Available on-line at http:\/\/www.hit.bme.hu\/~buttyan\/publications.html","DOI":"10.1109\/TMC.2006.170"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Vajda, I.: Towards provable security for ad hoc routing protocols. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN) (October 2004)","DOI":"10.1145\/1029102.1029119"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Foundations of Security Analysis and Design","year":"2000","unstructured":"Focardi, R., Gorrieri, R. (eds.): Foundations of Security Analysis and Design. LNCS, vol.\u00a02171. Springer, Heidelberg (2000)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-45608-2_4","volume-title":"Foundations of Security Analysis and Design","author":"J. Guttman","year":"2001","unstructured":"Guttman, J.: Security goals: packet trajectories and strand spaces. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, p. 197. Springer, Heidelberg (2001)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.: Ariadne: A secure on-demonad routing protocol for ad hoc networks. In: Proceedings of the ACM Conference on Mobile Computing and Networking, Mobicom (2002)","DOI":"10.1145\/570645.570648"},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2004.1","volume":"2","author":"Y.-C. Hu","year":"2004","unstructured":"Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security and Privacy Magazine\u00a02(3), 28\u201339 (2004)","journal-title":"IEEE Security and Privacy Magazine"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume-title":"Mobile Computing","author":"D. Johnson","year":"1996","unstructured":"Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch. 5, pp. 153\u2013181. Kluwer Academic Publisher, Dordrecht (1996)"},{"key":"10_CR9","volume-title":"Modern Cryptography: Theory and Practice","author":"W. Mao","year":"2004","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall PTR, Englewood Cliffs (2004)"},{"key":"10_CR10","unstructured":"Marshall, J.: An Analysis of the Secure Routing Protocol for mobile ad hoc network route discovery: using intuitive reasoning and formal verification to identify flaws. MSc thesis, Department of Computer Science, Florida State University (April 2003)"},{"key":"10_CR11","unstructured":"Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modelling Simulation Conference, CNDS (2002)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Perkins, C., Royer, E.: Ad hoc on-demand distance vector routing. In: Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90\u2013100 (1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: A secure routing protocol for ad hoc networks. In: Proceedings of the International Conference on Network Protocols, ICNP (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings of the ACM Workshop on Wireless Security, WiSe (2002)","DOI":"10.1145\/570681.570682"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Yang, S., Baras, J.: Modeling vulnerabilities of ad hoc routing protocols. In: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (October 2003)","DOI":"10.1145\/986858.986861"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11601494_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:01:54Z","timestamp":1619506914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11601494_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540309123","9783540316152"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11601494_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}