{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:05:31Z","timestamp":1725516331828},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540698388"},{"type":"electronic","value":"9783540698395"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69839-5_74","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"972-985","source":"Crossref","is-referenced-by-count":2,"title":["A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network"],"prefix":"10.1007","author":[{"given":"Md. Shariful","family":"Islam","sequence":"first","affiliation":[]},{"given":"Young Jig","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Md. Abdul","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"74_CR1","doi-asserted-by":"crossref","unstructured":"Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks\u00a047(4) (March 2005)","DOI":"10.1016\/j.comnet.2004.12.001"},{"key":"74_CR2","unstructured":"IEEE 802.11s Task Group, Draft Amendment to Standard for Information Technology Telecommunications and Information Exchange Between Systems \u2013 LAN\/MAN Specific Requirements \u2013 Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s\/D1.06 (July 2007)"},{"key":"74_CR3","doi-asserted-by":"crossref","unstructured":"Wang, X., Lim, A.O.: IEEE 802.11s wireless mesh networks: Framework and Challenges. AdHoc Networks, 1\u201315 (2007) doi:10.1016\/j.adhoc.2007.09.003","DOI":"10.1016\/j.adhoc.2007.09.003"},{"key":"74_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature (subtitle: That antique paper from 1979). In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"74_CR5","doi-asserted-by":"crossref","unstructured":"Bahr, M.: Proposed Routing for IEEE 802.11s WLAN Mesh Networks. In: 2nd Annual International Wireless Internet Conference (WICON), Boston, MA, USA (August 2006)","DOI":"10.1145\/1234161.1234166"},{"key":"74_CR6","doi-asserted-by":"crossref","unstructured":"Bahr, M.: Update on the Hybrid Wireless Mesh protocol of 802.11s. In: Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems, MASS 2007, pp. 1\u20136 (2007)","DOI":"10.1109\/MOBHOC.2007.4428721"},{"key":"74_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. MobiCom 2002, Atlanta, GA, September 23\u201328 (2002)","DOI":"10.1145\/570645.570648"},{"key":"74_CR8","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proc. of IEEE Symposium on Security and Privacy, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"issue":"11","key":"74_CR9","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1109\/TMC.2006.170","volume":"5","author":"L.B. Gergely","year":"2006","unstructured":"Gergely, L.B., Vajda, I.: Provably secure on-demand routing in Mobile Adhoc Networks. IEEE transactions on Mobile Computingm\u00a05(11), 1533\u20131546 (2006)","journal-title":"IEEE transactions on Mobile Computingm"},{"key":"74_CR10","doi-asserted-by":"crossref","unstructured":"Zapata, M.G., Asokan, N.: Securing Adhoc rouring protocols. In: Proc. of ACM Workshop of Wireless Security (Wise), September 2002, pp. 1\u201310 (2002)","DOI":"10.1145\/570681.570682"},{"key":"74_CR11","doi-asserted-by":"crossref","unstructured":"Sangiri, K., Dahil, B.: A Secure Routing Protocol for Ad Hoc Networks. In: Proc. of 10th IEEE International Conference on Network Protocols (ICNP 2002) (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"74_CR12","unstructured":"The Network Simulator \u2013 ns-2, \n                    \n                      http:\/\/www.isi.edu\/nsnam\/ns\/index.html"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69839-5_74.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:09:26Z","timestamp":1620014966000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69839-5_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540698388","9783540698395"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69839-5_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}