{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:26:12Z","timestamp":1743085572015,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_35","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T08:07:52Z","timestamp":1450253272000},"page":"562-572","source":"Crossref","is-referenced-by-count":0,"title":["A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks"],"prefix":"10.1007","author":[{"given":"Satyajit","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Debapriyay","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Suman","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"issue":"12","key":"35_CR1","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"11","key":"35_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"35_CR3","first-page":"533","volume":"25","author":"D Denning","year":"1982","unstructured":"Denning, D., Sacco, G.: Timestamps in key distribution protocols. Commun. ACM 25, 533\u2013536 (1982)","journal-title":"Commun. ACM"},{"unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitious security support for mobile ad-hoc networks. In: Proceedings of International conference on Network Protocols (2001)","key":"35_CR4"},{"key":"35_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003","key":"35_CR6","DOI":"10.1016\/S1570-8705(03)00008-8"},{"unstructured":"Wang, W., Zhu, Y., Li, B.: Self-managed heterogeneous certification in mobile ad hoc networks. In: Proceedings of IEEE Vehicular Technology Conference (2003)","key":"35_CR7"},{"unstructured":"Khalili, A., Katz, J., Arbaugh, W.: Toward secure key distribution in truly ad-hoc networks. In: Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, 28 January 2003","key":"35_CR8"},{"doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis and defenses. In: Proceedings of Third International Symposium on Information Processing in Sensor Networks, April 2004","key":"35_CR9","DOI":"10.1145\/984622.984660"},{"unstructured":"Zhang, Q., Wang, P., Reeves, D.S., Ning, P.: Defending sybil attacks in sensor networks. In: Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS-2005), June 2005","key":"35_CR10"},{"issue":"1","key":"35_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"issue":"4","key":"35_CR12","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1109\/TIFS.2009.2031946","volume":"4","author":"N Saxena","year":"2009","unstructured":"Saxena, N., Yi, J.H.: Non-interactive self-certification for long-lived mobile ad hoc networks. IEEE Trans. Inf. Forensics Secur. (TIFS) 4(4), 946\u2013955 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur. (TIFS)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:48:43Z","timestamp":1559332123000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}