{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:49Z","timestamp":1725557929625},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642141706"},{"type":"electronic","value":"9783642141713"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14171-3_39","type":"book-chapter","created":{"date-parts":[[2010,6,12]],"date-time":"2010-06-12T07:34:46Z","timestamp":1276328086000},"page":"436-444","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Lightweight Authentication Protocol for Mobile Ad Hoc Network"],"prefix":"10.1007","author":[{"given":"Heshem A.","family":"EL Zouka","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"39_CR1","first-page":"483","volume":"2","author":"T. Camp","year":"2002","unstructured":"Camp, T., Boleng, J., Davies, V.: A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communication and Mobile Computing. Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications\u00a02(5), 483\u2013502 (2002)","journal-title":"Wireless Communication and Mobile Computing. Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Hong, X., Gerla, G.P.M., Chiang, C.: A group mobility model for ad-hoc wireless networks. In: 2nd ACM International Workshop on Modeling and Simulation of Wireless and Mobile Systems (MSWiM 1999), p. 8 (August 1999)","DOI":"10.1145\/313237.313248"},{"issue":"1-2","key":"39_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11276-004-4744-y","volume":"11","author":"Y.-C. Hu","year":"2005","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks (WINET), ACM and Springer\u00a011(1-2), 21\u201338 (2005)","journal-title":"Wireless Networks (WINET), ACM and Springer"},{"issue":"5","key":"39_CR4","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/49.391750","volume":"13","author":"A. Myles","year":"1995","unstructured":"Myles, A., Johnson, D.B., Perkins, C.: A Mobile Host Protocol Supporting Route Optimization and Authentication. IEEE Journal on Selected Areas in Communications, special issue on Mobile and Wireless Computing Networks\u00a013(5), 839\u2013849 (1995)","journal-title":"IEEE Journal on Selected Areas in Communications, special issue on Mobile and Wireless Computing Networks"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Hubaux, J.-P., Butty\u00e1n, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, USA (October 2001)","DOI":"10.1145\/501416.501437"},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1109\/JPROC.2003.814927","volume":"91","author":"H. Qi","year":"2003","unstructured":"Qi, H., Xu, Y., Wang, X.: Mobile-agent based collaborative signal and information processing. Proceedings of the IEEE\u00a091, 1172\u20131183 (2003)","journal-title":"Proceedings of the IEEE"},{"key":"39_CR7","volume-title":"Programming and Deploying Java Mobile Agents with Aglets","author":"D.B. Lange","year":"1998","unstructured":"Lange, D.B., Oshima, M.: Programming and Deploying Java Mobile Agents with Aglets. Addison Wesley Longman, Reading (1998)"},{"issue":"5","key":"39_CR8","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1023\/A:1025146013151","volume":"8","author":"L. Butty\u00e1n","year":"2003","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications\u00a08(5), 579\u2013592 (2003)","journal-title":"Mobile Networks and Applications"},{"key":"39_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security","author":"B. Tung","year":"2002","unstructured":"Tung, B., Neuman, C., Hur, M., Medvinsky, A., Medvinsky, S., Wray, J.: Public-key cryptography for initial authentication. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433. Springer, Heidelberg (2002)"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Kaufman, C. (ed.): The Internet Key Exchange (IKEv2) Protocol, RFC 4306 (December 2005)","DOI":"10.17487\/rfc4306"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1), RFC 3174, Motorola and Cisco (September 2001)","DOI":"10.17487\/rfc3174"},{"key":"39_CR12","unstructured":"Takai, M., Ahuja, R., Tang, K., Bagrodia, R., Gerla, M.: GloMoSim: A Scalable Network Simulation Environment. UCLA Computer Science Department Technical Report 990027 (1999)"},{"key":"39_CR13","unstructured":"Mostafa, S., Zouka, H.E., Naser, M.A.E.: Hybrid Encryption Secure Routing Protocols for Wireless Sensor Network. In: 1st International Conference on Sensor Networks and Applications (SNA), San Francisco, CA, pp. 109\u2013114 (November 2009)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14171-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T22:39:37Z","timestamp":1559169577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14171-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642141706","9783642141713"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14171-3_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}