{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:52:28Z","timestamp":1725472348982},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540491125"},{"type":"electronic","value":"9783540491149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11927587_16","type":"book-chapter","created":{"date-parts":[[2006,11,8]],"date-time":"2006-11-08T05:12:43Z","timestamp":1162962763000},"page":"179-193","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Jongoh","family":"Choi","sequence":"first","affiliation":[]},{"given":"Si-Ho","family":"Cha","sequence":"additional","affiliation":[]},{"given":"JooSeok","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications (2004)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perring, A., Johnson, D.: Ariadne - A Secure On-Demand Routing Protocol for Ad Hoc Networks. ACM MOBICOM (2002)","DOI":"10.1145\/570645.570648"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Marti, S., et al.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. ACM MOBICOM (2000)","DOI":"10.1145\/345910.345955"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Zapata, M., Asokan, N.: Securing Ad Hoc Routing Protocols. ACM WiSe (2002)","DOI":"10.1145\/570681.570682"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Hu, Y., Johnson, D., Perring, A.: Sead - Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. IEEE WMCSA (2002)","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., et al.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. ACM WiSe (2002)","DOI":"10.1145\/570681.570684"},{"key":"16_CR7","unstructured":"Na, G., et al.: Secure Mechanism to manage selfish nodes in Ad hoc Network. JCCI (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11927587_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:46:46Z","timestamp":1619509606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11927587_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540491125","9783540491149"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11927587_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}