{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T17:10:02Z","timestamp":1746292202869,"version":"3.40.4"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319092645"},{"type":"electronic","value":"9783319092652"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09265-2_42","type":"book-chapter","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T22:38:35Z","timestamp":1404254315000},"page":"412-421","source":"Crossref","is-referenced-by-count":0,"title":["On Exploring the Secure Connectivity of Wireless Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Dianjie","family":"Lu","sequence":"first","affiliation":[]},{"given":"Guijuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"42_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks\u00a038(4), 393\u20134221 (2002)","journal-title":"Computer Networks"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Gupta, P., Kumar, P.R.: Critical Power for Asymptotic Connectivity in Wireless Networks. In: Proc. of IEEE Conference on Decision and Control, pp. 1106\u20131110 (December 1998)","DOI":"10.1109\/CDC.1998.760846"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Dousse, O., Mannersalo, P., Thiran, P.: Latency of Wireless Sensor Networks with Uncoordinated Power Saving Mechanisms. In: Proc. of ACM MobiHoc 2004 (May 2004)","DOI":"10.1145\/989459.989474"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Kong, Z., Yeh, E.M.: Connectivity and Latency in Large-Scale Wireless Networks with Unreliable Links. In: Proc. of IEEE INFOCOM 2008 (April 2008)","DOI":"10.1109\/INFOCOM.2008.11"},{"key":"42_CR5","doi-asserted-by":"publisher","first-page":"1260","DOI":"10.1109\/INFCOM.2012.6195487","volume-title":"Proc. of IEEE INFOCOM 2012","author":"D. Lu","year":"2012","unstructured":"Lu, D., Huang, X., Li, P., Fan, J.: Connectivity of Large-scale Cognitive Radio Ad hoc Networks. In: Proc. of IEEE INFOCOM 2012, pp. 1260\u20131268. IEEE Press, Orlando (2012)"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/INFCOM.2012.6195489","volume-title":"Proc. of IEEE INFOCOM 2012","author":"L. Sun","year":"2012","unstructured":"Sun, L., Wang, W.: Understanding the Tempo-spatial Limits of Information Dissemination in Multi-channel Cognitive Radio Networks. In: Proc. of IEEE INFOCOM 2012, pp. 1278\u20131286. IEEE Press, Orlando (2012)"},{"key":"42_CR7","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1088\/0305-4470\/33\/42\/104","volume":"86","author":"J. Quintanilla","year":"2000","unstructured":"Quintanilla, J., Torquato, S., Ziff, R.M.: Efficient Measurement of the Percolation Threshold for Fully Penetrable Discs. Physics A\u00a086, 399\u2013407 (2000)","journal-title":"Physics A"},{"key":"42_CR8","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1002\/rsa.20064","volume":"26","author":"P. Balister","year":"2005","unstructured":"Balister, P., Bollobas, B., Walters, M.: Continuum Percolation with Steps in the Square or the Disc. Random Structures Algorithms\u00a026, 392\u2013403 (2005)","journal-title":"Random Structures Algorithms"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Kong, Z., Yeh, E.M.: Analytical Lower Bounds on the Critical Density in Continuum Percolation. In: Proc. of the Workshop on Spatial Stochastic Models in Wireless Networks (April 2007)","DOI":"10.1109\/WIOPT.2007.4480080"},{"issue":"2","key":"42_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/TNET.2011.2106162","volume":"19","author":"C. Zhang","year":"2011","unstructured":"Zhang, C., Song, Y., Fang, Y., Zhang, Y.: On the Price of Security in Large-Scale Wireless Ad Hoc Networks. IEEE\/ACM Transaction on Networking\u00a019(2), 319\u2013331 (2011)","journal-title":"IEEE\/ACM Transaction on Networking"},{"key":"42_CR11","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198506263.001.0001","volume-title":"Random Geometric Graphs","author":"M. Penrose","year":"2003","unstructured":"Penrose, M.: Random Geometric Graphs. Oxford University Press, New York (2003)"},{"key":"42_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511895357","volume-title":"Continuum Percolation","author":"R. Meester","year":"1996","unstructured":"Meester, R., Roy, R.: Continuum Percolation. Cambridge University Press, New York (1996)"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing and the Networked World"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09265-2_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T16:34:17Z","timestamp":1746290057000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09265-2_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319092645","9783319092652"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09265-2_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}