{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:37:26Z","timestamp":1725543446246},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540367079"},{"type":"electronic","value":"9783540368601"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11802372_86","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T10:26:36Z","timestamp":1153736796000},"page":"728-733","source":"Crossref","is-referenced-by-count":0,"title":["Cluster-Based Secure Data Transmission Solution for Ad Hoc Network"],"prefix":"10.1007","author":[{"given":"Hwan-Seok","family":"Yang","sequence":"first","affiliation":[]},{"given":"Joung-Min","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seung-Kyu","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report TR-200030, Dept. of Computer Science, UCLA (2000)","key":"86_CR1"},{"doi-asserted-by":"crossref","unstructured":"Venkatraman, L., Agrawal, D.P.: A Novel Authentication scheme for Ad Hoc Networks. In: Wireless Communications and Networking Conference (2000)","key":"86_CR2","DOI":"10.1109\/WCNC.2000.904814"},{"unstructured":"Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications., George Mason Univ., Tech. Rep (1997)","key":"86_CR3"},{"issue":"6","key":"86_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Network\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network"},{"unstructured":"Bayya, A., Gupte, S., Shukla, Y., Garikapati, A.: Security in Ad hoc networks, CS 685, Computer Science Department University of Kentucky","key":"86_CR5"},{"unstructured":"Lo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. In: Proc. 7th IEEE Symp. On Comp. and Communication (ISCC), Taormina (2002)","key":"86_CR6"}],"container-title":["Lecture Notes in Computer Science","Agent Computing and Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11802372_86.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:25:32Z","timestamp":1619508332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11802372_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540367079","9783540368601"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/11802372_86","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}