{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:38Z","timestamp":1725549998335},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240754"},{"type":"electronic","value":"9783540305552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30555-2_46","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:35:49Z","timestamp":1268400949000},"page":"391-399","source":"Crossref","is-referenced-by-count":0,"title":["UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Neelima","family":"Arora","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Shyamasundar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keyed Hash Functions and Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"46_CR2","volume-title":"Mobility Helps Security in Ad Hoc Networks","author":"S. Capkun","year":"2003","unstructured":"Capkun, S., Hubaux, J.-P., Buttyan, L.: Mobility Helps Security in Ad Hoc Networks. ACM MobiHoc, New York (2003)"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Mobicom (2002)","DOI":"10.1145\/570645.570648"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Johnson, D., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: IEEE Workshop on Mobile Computing Systems and Applications (June 2002)","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"46_CR5","unstructured":"iButton Details, http:\/\/www.ibutton.com"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Khalili, A., Arbaugh, W.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad-Hoc Networks (2003)","DOI":"10.1109\/SAINTW.2003.1210183"},{"key":"46_CR7","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication with Insecure Communication. CACM\u00a024, 770\u2013771 (1981)","journal-title":"CACM"},{"key":"46_CR8","unstructured":"Papadimitratos, P., Haas, Z.: Secure Routing for Mobile Adhoc Networks. In: Communication Networks and Distributed Systems Modeling and Simulation Conference (January 2002)"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security Protocols for Sensor Networks. Wireless Networks (2002)","DOI":"10.1023\/A:1016598314198"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: TESLA Broadcast Authentication Protocol. RSA Cryptobytes (2002)","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Royer, E.M., Toh, C.K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Pers. Comm. (April 1999)","DOI":"10.1109\/98.760423"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. 3rd AT & T Software Symp. (October 1999)","DOI":"10.1007\/10720107_24"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, L., Haas, Z.: Securing Ad Hoc Networks. IEEE Networks\u00a013(6) (1999)","DOI":"10.1109\/65.806983"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30555-2_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:56Z","timestamp":1605759716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30555-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240754","9783540305552"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30555-2_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}