{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:21:44Z","timestamp":1725520904397},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540895237"},{"type":"electronic","value":"9783540895244"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89524-4_64","type":"book-chapter","created":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T01:10:09Z","timestamp":1227057009000},"page":"649-658","source":"Crossref","is-referenced-by-count":6,"title":["Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks"],"prefix":"10.1007","author":[{"given":"Insun","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jihoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"William","family":"Arbaugh","sequence":"additional","affiliation":[]},{"given":"Daeyoung","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"64_CR1","doi-asserted-by":"crossref","unstructured":"Akyildiz, I.F., Wang, X.: A Survey on Wireless Mesh Networks. IEEE Radio Comm. Mag., 23\u201330 (September 2005)","DOI":"10.1109\/MCOM.2005.1509968"},{"issue":"1","key":"64_CR2","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MWC.2004.1269716","volume":"11","author":"H. Yang","year":"2004","unstructured":"Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications\u00a011(1), 38\u201347 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"64_CR3","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E.: Ad-hoc on demand distance vector (AODV) routing. In: IEEE workshop in Mobile computing Systems and Applications (February 1999)","DOI":"10.1109\/MCSA.1999.749281"},{"issue":"1","key":"64_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/881978.882002","volume":"7","author":"L. Buttyan","year":"2002","unstructured":"Buttyan, L., Hubaux, J.-P.: Report on a working session on security in wireless ad hoc networks. ACM Mobile Computing and Communications Review\u00a07(1), 74\u201394 (2002)","journal-title":"ACM Mobile Computing and Communications Review"},{"key":"64_CR5","doi-asserted-by":"crossref","unstructured":"Gong, L.: Increasing Availability and Security of an Authentication Service. IEEE Journal on Selected Areas in Communications\u00a011(5) (June 1993)","DOI":"10.1109\/49.223866"},{"issue":"9","key":"64_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2004.1336724","volume":"42","author":"R. Pabst","year":"2004","unstructured":"Pabst, R., et al.: Relay-based deployment concepts for wireless and mobile broadband radio. IEEE Communications Magazine\u00a042(9), 80\u201389 (2004)","journal-title":"IEEE Communications Magazine"},{"key":"64_CR7","doi-asserted-by":"crossref","unstructured":"Karof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004) (November 2004)","DOI":"10.1145\/1031495.1031515"},{"key":"64_CR8","doi-asserted-by":"crossref","unstructured":"Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A Low-Energy Key Management Protocol for Wireless Sensor Networks. In: IEEE Symposium on Computers and Communications (2003)","DOI":"10.1109\/ISCC.2003.1214142"},{"key":"64_CR9","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of Security and Privacy, 2003, pp. 197\u2013213 (2003)"},{"key":"64_CR10","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., et al.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001 (2001)","DOI":"10.1145\/381677.381696"},{"key":"64_CR12","unstructured":"IEEE Std. 802.11i, IEEE Standard for Telecommunications and Information Exchange between Systems-lan\/man Specific Requirements, Part 11: Wireless Medium Access Control and Physical Layer (phy) Specifications Amendment 6: Medium Access Control (MAC) Security Enhancements (2004)"},{"key":"64_CR13","doi-asserted-by":"crossref","unstructured":"Capkin, S., Hubaux, J.P., Buttyan, L.: Mobility Helps Security in Ad hoc Networks. In: ACM MobiHoc (2003)","DOI":"10.1145\/778415.778422"},{"key":"64_CR14","unstructured":"IEEE 802.11 TGs document IEEE P.802.11-04\/662r14, http:\/\/www.ieee802.org\/11"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Towards Ubiquitous Networking and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89524-4_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T11:05:39Z","timestamp":1557918339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89524-4_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540895237","9783540895244"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89524-4_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}