{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T05:32:56Z","timestamp":1737610376430,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770169"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77018-3_63","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T07:46:39Z","timestamp":1196063199000},"page":"636-643","source":"Crossref","is-referenced-by-count":0,"title":["Streaming Media Securely over Multipath Multihop Wireless Network"],"prefix":"10.1007","author":[{"given":"Binod","family":"Vaidya","sequence":"first","affiliation":[]},{"given":"SangDuck","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Eung-Kon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"SeungJo","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-540-24663-3_10","volume-title":"Performance Tools and Applications to Networked Systems","author":"S. Mueller","year":"2004","unstructured":"Mueller, S., et al.: Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges. In: Calzarossa, M.C., Gelenbe, E. (eds.) Performance Tools and Applications to Networked Systems. LNCS, vol.\u00a02965, pp. 209\u2013234. Springer, Heidelberg (2004)"},{"key":"63_CR2","doi-asserted-by":"crossref","unstructured":"Li, X., Cuthbert, L.: Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks. In: IEEE MASCOTS 2004, Netherlands, pp. 184\u2013191 (2004)","DOI":"10.1145\/1023663.1023704"},{"issue":"1","key":"63_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S1570-8705(03)00049-0","volume":"2","author":"Z. Ye","year":"2004","unstructured":"Ye, Z., et al.: A routing framework for providing robustness to node failures in mobile ad hoc networks. Elsevier Ad Hoc Networks Journal\u00a02(1), 87\u2013107 (2004)","journal-title":"Elsevier Ad Hoc Networks Journal"},{"key":"63_CR4","doi-asserted-by":"crossref","unstructured":"Wang, L., et al.: Multipath source routing in wireless ad hoc networks. In: CCECE 2000, vol.\u00a01, pp. 479\u2013483 (2000)","DOI":"10.1109\/CCECE.2000.849755"},{"key":"63_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume":"353","author":"D. Johnson","year":"1996","unstructured":"Johnson, D., Maltz, D.: Dynamic source routing in ad hoc wireless networks. Mobile Computing\u00a0353, 153\u2013181 (1996)","journal-title":"Mobile Computing"},{"key":"63_CR6","first-page":"867","volume":"3","author":"S.J. Lee","year":"2001","unstructured":"Lee, S.J., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. IEEE ICC 2001\u00a03, 867\u2013871 (2001)","journal-title":"IEEE ICC 2001"},{"key":"63_CR7","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., et al.: Ad hoc on-demand distance vector (AODV) routing. In: IETF RFC, vol.\u00a03561 (2003)","DOI":"10.17487\/rfc3561"},{"key":"63_CR8","first-page":"1311","volume":"3","author":"S.J. Lee","year":"2000","unstructured":"Lee, S.J., Gerla, M.: AODV-BR: Backup routing in ad hoc networks. IEEE WCNC 2000\u00a03, 1311\u20131316 (2000)","journal-title":"IEEE WCNC 2000"},{"issue":"7","key":"63_CR9","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1002\/wcm.432","volume":"6","author":"M.K. Marina","year":"2006","unstructured":"Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing. Wiley Wireless Communications and Mobile Computing\u00a06(7), 969\u2013988 (2006)","journal-title":"Wiley Wireless Communications and Mobile Computing"},{"key":"63_CR10","doi-asserted-by":"crossref","unstructured":"Wei, W., Zakhor, A.: Robust Multipath Source Routing Protocol (RMPSR) for Video Communication over Wireless Ad Hoc Networks. In: ICME 2004, Taiwan, pp. 1379\u20131382 (2004)","DOI":"10.1109\/ICME.2004.1394487"},{"issue":"10","key":"63_CR11","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1109\/JSAC.2003.815965","volume":"21","author":"S. Mao","year":"2003","unstructured":"Mao, S., et al.: Video transport over ad hoc networks: multistream coding with multipath transport. IEEE Journal on Selected Areas in Communications\u00a021(10), 1721\u20131737 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"63_CR12","first-page":"340","volume":"1999","author":"A.M. Alattar","year":"1999","unstructured":"Alattar, A.M., Al-Regib, G.I.: Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams. IEEE ISCAS\u00a01999, 340\u2013343 (1999)","journal-title":"IEEE ISCAS"},{"key":"63_CR13","unstructured":"Lookabaugh, T., et al.: Selective encryption and MPEG-2. ACM Multimedia (2003)"},{"key":"63_CR14","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/MILCOM.2004.1494903","volume":"2","author":"J.D. Gibson","year":"2004","unstructured":"Gibson, J.D., et al.: Selective Encryption and Scalable Speech Coding for Voice Communications over Multi-Hop Wireless Links. IEEE MILCOM 2004\u00a02, 792\u2013798 (2004)","journal-title":"IEEE MILCOM 2004"},{"key":"63_CR15","first-page":"859","volume":"2","author":"H. Dong","year":"2002","unstructured":"Dong, H., et al.: SNR and bandwidth scalable speech coding. IEEE ISCAS 2002\u00a02, 859\u2013862 (2002)","journal-title":"IEEE ISCAS 2002"},{"key":"63_CR16","unstructured":"Pallapothu, S., Mahajan, S.: Selective Encryption Support in SRTP. draft-smahajan-srtp-selective-encryption-00.txt, work in progress (2006)"},{"issue":"2","key":"63_CR17","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.adhoc.2005.10.002","volume":"5","author":"L.R. Reddy","year":"2007","unstructured":"Reddy, L.R., Raghavan, S.V.: SMORT: Scalable multipath on-demand routing for mobile ad hoc networks. Elsevier Ad hoc Networks\u00a05(2), 162\u2013188 (2007)","journal-title":"Elsevier Ad hoc Networks"},{"key":"63_CR18","unstructured":"ITU-T, 5-, 4-, 3-, and 2-bit\/sample embedded adaptive differential pulse code modulation (ADPCM) (December 1990)"},{"key":"63_CR19","unstructured":"ISO\/IEC JTC1 SC29\/WG11, ISO\/IEC FDIS 14496-3, Subparts 1, 2, 3, Coding of Audio-Visual Objects Part 3: Audio, ISO\/IEC JTC1 SC29\/WG11 N2503 (October 1998)"},{"key":"63_CR20","unstructured":"OPNET Modeler Simulation Software, http:\/\/www.opnet.com"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77018-3_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T21:49:20Z","timestamp":1737582560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77018-3_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770169"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77018-3_63","relation":{},"subject":[]}}