{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:09:11Z","timestamp":1761401351003,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540771128"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77115-9_10","type":"book-chapter","created":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T10:11:56Z","timestamp":1196331116000},"page":"97-109","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Certificate Authority for Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Jaydip","family":"Sen","sequence":"first","affiliation":[]},{"given":"Harihara","family":"Subramanyam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Yi, S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. In: PKI 2003. 2nd Annual PKI Research Workshop Program, Gaithersburg, Maryland (2003)"},{"key":"10_CR2","volume-title":"New Security Paradigms Workshop 1997","author":"A. Abdul-Rahman","year":"1997","unstructured":"Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: New Security Paradigms Workshop 1997, ACM Press, New York (1997)"},{"issue":"6","key":"10_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.: Securing Ad Hoc Networks. IEEE Network Magazine\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network Magazine"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: ACM MobiHoc 2001, Long Beach, CA, USA (2001)","DOI":"10.1145\/501436.501437"},{"key":"10_CR5","volume-title":"The Official PGP User\u2019s Guide","author":"P. Zimmerman","year":"1995","unstructured":"Zimmerman, P.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995)"},{"key":"10_CR6","unstructured":"Eshenauer, L., Gligor, V.D., Baras, J.: On Trust Establishment in Mobile Ad Hoc Networks. In: Security Protocols Workshop, Cambridge (2002)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Kong, J., Zefros, P., Luo, H., Lu, S., Zhang, L.: Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: 9th International Conference on Network Protocols (ICNP), pp. 251\u2013260 (November 2001)","DOI":"10.1109\/ICNP.2001.992905"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad Hoc Networks. In: 4th International Conference on Information Security and Cryptology (ICISC), Seoul (December 2001)","DOI":"10.1007\/3-540-45861-1_26"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM (1979)","DOI":"10.1145\/359168.359176"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Shoup, V.: Practical Threshold Signatures. Theory and Applications of Cryptographic Techniques, 207\u2013220 (2000)","DOI":"10.1007\/3-540-45539-6_15"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Asokan, N., Ginzboorg, P.: Key Agreement in Ad Hoc Networks. Computer Communications\u00a023 (2000)","DOI":"10.1016\/S0140-3664(00)00249-8"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a01796, Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77115-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T00:25:46Z","timestamp":1737591946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77115-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540771128"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77115-9_10","relation":{},"subject":[]}}