{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:55:19Z","timestamp":1725540919850},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_15","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T02:37:49Z","timestamp":1258079869000},"page":"193-207","source":"Crossref","is-referenced-by-count":5,"title":["BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs"],"prefix":"10.1007","author":[{"given":"Vanessa","family":"Frias-Martinez","sequence":"first","affiliation":[]},{"given":"Salvatore J.","family":"Stolfo","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Bloom, B.H.: Space\/Time tradeoffs in hash coding with allowable errors. Communications of the ACM\u00a013(7) (1970)","DOI":"10.1145\/362686.362692"},{"key":"15_CR2","unstructured":"ENRON Dataset (2004), www.cs.cmu.edu\/~enron"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-85886-7_12","volume-title":"Information Security","author":"V. Frias-Martinez","year":"2008","unstructured":"Frias-Martinez, V., Stolfo, S.J., Keromytis, A.D.: Behavior-Based Network Access Control: A Proof-of-Concept. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol.\u00a05222, pp. 175\u2013190. Springer, Heidelberg (2008)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Frias-Martinez, V., Stolfo, S.J., Keromytis, A.D.: Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. In: ACSAC (2008)","DOI":"10.1109\/ACSAC.2008.30"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Frias-Martinez, V., et al.: A Network Access Control Mechanism Based on Behavior Profiles. In: ACSAC (2009)","DOI":"10.1109\/ACSAC.2009.10"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Hastad, J., et al.: Funkspiel Schemes: An Alternative to Conventional Tamper Resistance. In: Proc. of the 7th ACM Conf. on Computer Commun. Security (2000)","DOI":"10.1145\/352600.352619"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"A. Herzberg","year":"1995","unstructured":"Herzberg, A., et al.: Proactive Secret Sharing Or: How to Cope with the Perpetual Leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 339\u2013352. Springer, Heidelberg (1995)"},{"key":"15_CR8","unstructured":"Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks, Technical Report, UCLA (2000)"},{"key":"15_CR9","unstructured":"Narasimha, M., et al.: On the utility of Distributed Cryptography in P2P and MANETs: the case of Membership Control. In: Proc. of the 11th ICNP (2003)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Yung, M.: How To Withstand Mobile Virus Attacks. In: Proc. of the 10th ACM Symp. on the Principles of Distributed Computing (1991)","DOI":"10.1145\/112600.112605"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Data Transmission in Mobile Ad Hoc Networks. In: Proceedings of the ACM Workshop on Wireless Security, WiSe (2003)","DOI":"10.1145\/941311.941318"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T.P. Pedersen","year":"1991","unstructured":"Pedersen, T.P.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547. Springer, Heidelberg (1991)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Communications ACM\u00a022(11) (1979)","DOI":"10.1145\/359168.359176"},{"key":"15_CR14","unstructured":"Shaner, R.A.: US Patent No. 5,991,714 (November 1999)"},{"key":"15_CR15","unstructured":"Snort Rulesets, http:\/\/www.snort.org\/pub-in\/downloads.cgi"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Stolfo, S.J., et al.: Behavior-based Modeling and its Application to Email Analysis. ACM Transactions on Internet Technology (TOIT)\u00a06(2) (2006)","DOI":"10.1145\/1149121.1149125"},{"key":"15_CR17","unstructured":"VXHeavens, vx.netlux.org"},{"key":"15_CR18","unstructured":"Zhang, Y., Lee, W., Huang, Y.: Intrusion Detection Techniques for Mobile Wireless Networks. Mobile Networks and Applications\u00a09(5) (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:34:41Z","timestamp":1606167281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}