{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:11:47Z","timestamp":1725549107246},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540243960"},{"type":"electronic","value":"9783540304968"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30496-8_7","type":"book-chapter","created":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T10:39:21Z","timestamp":1267439961000},"page":"66-81","source":"Crossref","is-referenced-by-count":1,"title":["Linking Ad Hoc Charging Schemes to AAAC Architectures"],"prefix":"10.1007","author":[{"given":"Joao","family":"Girao","sequence":"first","affiliation":[]},{"given":"Bernd","family":"Lamparter","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]},{"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[]},{"given":"Joao P.","family":"Barraca","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc NeTworks), pp. 226\u2013236"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking, ACM MobiCom 2000 Conference, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"7_CR3","unstructured":"Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC\/2001\/001, Swiss Federal Institute of Technology, Lausanne (2001)"},{"key":"7_CR4","unstructured":"Zhong, S., Yang, Y., Chen, J.: Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks (2002)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Lamparter, B., Paul, K., Westhoff, D.: Charging support for ad hoc stub networks. Elsevier Journal of Computer Communications, Special Issue on Internet Pricing and Charging: Algorithms, Technology and Applications (2003)","DOI":"10.1016\/S0140-3664(03)00034-3"},{"key":"7_CR6","unstructured":"de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Technical report"},{"key":"7_CR7","series-title":"The Kluwer International Series in Engineering and Computer Science","volume-title":"Mobile Computing","author":"D.B. Johnson","year":"1996","unstructured":"Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing. The Kluwer International Series in Engineering and Computer Science, vol.\u00a0353. Kluwer Academic Publishers, Dordrecht (1996), http:\/\/athos.rutgers.edu\/imielins\/book.html"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/357980.358017","volume":"26","author":"R.L. Rivest","year":"1983","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems (reprint). Communications of the ACM\u00a026, 96\u201399 (1983)","journal-title":"Communications of the ACM"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"7_CR10","unstructured":"Riedel, I.: Security in ad hoc networks: Protocols and elliptice curve cryptography on an embedded platform. Diploma thesis at NEC, University of Bochum (2003)"},{"key":"7_CR11","unstructured":"Lamparter, B., Paar, C., Weimerskirch, A., Westhoff, D.: On digital signatures in ad hoc networks. IEEE Journal on Selected Areas in Communications \u2018Wireless Ad Hoc Networks\u2019 (submitted, 2004)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Generic AAA architecture. Internet Request for Comment RFC 2903, Internet Engineering Task Force (2000)","DOI":"10.17487\/rfc2903"},{"key":"7_CR13","unstructured":"Hickman, K.E.B.: The SSL protocol. RFC draft, Netscape Communications Corp., Version 1.0 (1994)"},{"key":"7_CR14","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing for ip version 6, Internet-Draft draft-perkins-aodv6-01.txt (2001) (work in progress)"},{"key":"7_CR15","unstructured":"Jelger, C., Noel, T., Frey, A.: draft-jelger-manet-gateway-autoconf-v6-01.txt. Internet-Draft draft-jelger-manet-gateway-autoconf-v6-01.txt (2003) (work in progress)"},{"key":"7_CR16","unstructured":"Cha, H.W., Park, J.S., Kim, H.J.: Support of internet connectivity for aodv. Internet-Draft draft-cha-manet-AODV-internet-00.txt (2004) (work in progress)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter base protocol. Internet Request for Comment RFC 2903, Internet Engineering Task Force (2003)","DOI":"10.17487\/rfc3588"},{"key":"7_CR18","unstructured":"Mgen - the multi-generator toolset (2004), http:\/\/manimac.itd.nrl.navy.mil\/MGEN\/"},{"key":"7_CR19","unstructured":"The public netperf homepage (2004), http:\/\/www.netperf.org\/netperf\/NetperfPage.html"}],"container-title":["Lecture Notes in Computer Science","Security in Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30496-8_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:55:06Z","timestamp":1605743706000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30496-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540243960","9783540304968"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30496-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}