{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:46:44Z","timestamp":1725490004804},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735335"},{"type":"electronic","value":"9783540735380"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73538-0_6","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T23:45:05Z","timestamp":1187221505000},"page":"77-92","source":"Crossref","is-referenced-by-count":6,"title":["Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments"],"prefix":"10.1007","author":[{"given":"Sudip","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Nayot","family":"Poolsappasit","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to Strangers: Authentication in Adhoc Wireless Networks. In: Symposium on Network and Distributed Systems Security (NDSS 2002), San Diego, California, USA (February 2002)"},{"key":"6_CR2","unstructured":"Chiang, C.C., Wu, H.K., Liu, W., Gerla, M.: Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel. In: 5th IEEE Singapore International Conference on Networks (SICON 1997), Kent Ridge, Singapore, pp. 197\u2013211 (April 1997)"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/BF01196259","volume":"1","author":"M.S. Corson","year":"1995","unstructured":"Corson, M.S., Ephremides, A.: A Distributed Routing Algorithm for Mobile Wireless Networks. Wireless Networks\u00a01(1), 61\u201382 (1995)","journal-title":"Wireless Networks"},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TCOM.1981.1094876","volume":"29","author":"E. Gafni","year":"1981","unstructured":"Gafni, E., Bertsekas, D.: Distributed Algorithms for Geneerating Loop-free Routes in Network with Frequently Changing Topology. IEEE Transaction and Communication\u00a029(1), 11\u201315 (1981)","journal-title":"IEEE Transaction and Communication"},{"issue":"3","key":"6_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/BF01200845","volume":"1","author":"M. Gerla","year":"1995","unstructured":"Gerla, M., Tsai, J.T.: Multicluster, Mobile, Multimedia Radio Network. Wireless Networks\u00a01(3), 255\u2013265 (1995)","journal-title":"Wireless Networks"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom 2002), Atlanta, Georgia, USA (September 2002)","DOI":"10.1145\/570645.570648"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.: Secure Data Transmission in Mobile Ad Hoc Networks. In: ACM Workshop on Wireless Security (WiSe 2003), San Diego, California, USA (September 2003)","DOI":"10.1145\/941311.941318"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance Vector (DSDV) for Mobile Computers. In: Conference on Communication Architectures, Protocols and Applications (SIGCOMM 1994), London, UK, pp. 234\u2013244 (August 1994)","DOI":"10.1145\/190314.190336"},{"key":"6_CR9","unstructured":"Toh, C.K.: A Novel Distributed Routing Protocol To Support Ad hoc Mobile Computing. In: IEEE 15th Annual International Phoenix Conference on Computers and Communication (IPCCC 1996), Phoenix, AZ, USA, pp. 480\u2013486 (1996)"},{"issue":"6","key":"6_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1102219.1102222","volume-title":"Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005)","author":"C. Zouridaki","year":"2005","unstructured":"Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, VA, USA, pp. 1\u201310. ACM Press, NewYork (2005)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe 2002), Atlanta, GA, USA, pp. 21\u201330 (September 2002)","DOI":"10.1145\/570681.570684"},{"issue":"1","key":"6_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/98.575990","volume":"4","author":"R. Dube","year":"1997","unstructured":"Dube, R., Rais, C.D., Wang, K.Y., Tripathi, S.K.: Signal Stability-Based Adaptive Routing (SSA) for Ad Hoc Mobile Networks. IEEE Personal Communications Magazine\u00a04(1), 36\u201345 (1997)","journal-title":"IEEE Personal Communications Magazine"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/501416.501464","volume-title":"Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001)","author":"S. Yi","year":"2001","unstructured":"Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad Hoc Routing for Wireless Networks. In: Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), Long Beach, CA, October 2001, pp. 299\u2013302. ACM Press, New York (2001)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-540-30108-0_16","volume-title":"Computer Security \u2013 ESORICS 2004","author":"I. Ray","year":"2004","unstructured":"Ray, I., Chakraborty, S.: A Vector Model of Trust for Developing Trustworthy Systems. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 260\u2013275. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security XXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73538-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T22:24:28Z","timestamp":1550787868000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73538-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540735335","9783540735380"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73538-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}