{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:35:15Z","timestamp":1736573715700,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540393689"},{"type":"electronic","value":"9783540393726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11847366_67","type":"book-chapter","created":{"date-parts":[[2006,9,8]],"date-time":"2006-09-08T20:50:18Z","timestamp":1157748618000},"page":"653-661","source":"Crossref","is-referenced-by-count":1,"title":["Multistage Authentication Scheme for Mobile Ad-Hoc Network Using Clustering Mechanism"],"prefix":"10.1007","author":[{"given":"Hyewon K.","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jaeyoung","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"67_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Hass, Z.J.: Securing Ad-Hoc Networks. IEEE Network Magazine\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network Magazine"},{"key":"67_CR2","doi-asserted-by":"crossref","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: ICNP 2001, pp. 251\u2013260 (2001)","DOI":"10.1109\/ICNP.2001.992905"},{"key":"67_CR3","unstructured":"Frankel, Y., Desmedt, Y.G.: Parallel Reliable Threshold Multisignature. Tech. Report TR-92-04-02, Univ. of Wisconsin-Milwaukee (2002)"},{"key":"67_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Heinzelman, W.R., Chandrakasan, A., Balakrishnon, H.: Energy Efficient Communication in Protocol for Wireless Microsensor Networks. In: IEEE Proc. Hawaii Int\u2019l. Conf. Sys. Sci., pp. 1\u201310 (2000)","DOI":"10.1109\/HICSS.2000.926982"},{"key":"67_CR6","doi-asserted-by":"crossref","unstructured":"Kulik, J., Heinzelman, W.R., Balakrishnon, H.: Negotiation-Based Protocols for Disseminating Information Dissemination in Wireless Sensor Networks. Selected Papers from Mobicom 1999, pp. 169\u2013185 (2002)","DOI":"10.1145\/313451.313529"},{"issue":"11","key":"67_CR7","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Massachusetts Institute of Technology Communication of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Massachusetts Institute of Technology Communication of the ACM"},{"key":"67_CR8","unstructured":"Chiang, C., Wu, H., Liu, W., Gerla, M.: Routing in Clustered Multihop, Mobile wireless Networks with Fading Channel. In: Proc. IEEE Singapore International Conference on Networks, Singapore (1997)"},{"key":"67_CR9","doi-asserted-by":"crossref","unstructured":"Jordan, R., Abdallah, C.T.: Wireless Communications and Networking: an Overview. Antennas and Propagation Magazine, IEEE (2002)","DOI":"10.1109\/74.997963"},{"key":"67_CR10","unstructured":"Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenge and Solution. IEEE Wireless Communications (2004)"},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Mishra, A., Nadkarni, K., Patcha, A., Tech, V.: Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications (2004)","DOI":"10.1109\/MWC.2004.1269717"},{"key":"67_CR12","doi-asserted-by":"crossref","unstructured":"Perkins, C., Bhagwat, P.: Highly Dynamic Destination Sequence Distance Vector Routing (DSDV) for Mobile Computers. In: Proceedings of ACM SIGCOMM 1994, London, UK, pp. 234\u2013244 (1994)","DOI":"10.1145\/190809.190336"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11847366_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T20:12:13Z","timestamp":1736539933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11847366_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540393689","9783540393726"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11847366_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}