{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:40:11Z","timestamp":1740181211307,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642141706"},{"type":"electronic","value":"9783642141713"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14171-3_8","type":"book-chapter","created":{"date-parts":[[2010,6,12]],"date-time":"2010-06-12T11:34:46Z","timestamp":1276342486000},"page":"87-98","source":"Crossref","is-referenced-by-count":3,"title":["A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol"],"prefix":"10.1007","author":[{"given":"Satria","family":"Mandala","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Ngadi","sequence":"additional","affiliation":[]},{"given":"Abdul Hanan","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Abdul Samad","family":"Ismail","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"Post-Quantum Cryptography Book Chapter","author":"S. Hallgren","year":"2009","unstructured":"Hallgren, S., Vollmer, U.: Quantum Computing. In: Bernstein, D.J., Buch-mann, J., Dahmen, E. (eds.) Post-Quantum Cryptography Book Chapter. Springer, Heidelberg (2009)"},{"issue":"11","key":"8_CR2","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/11941378_25","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"J. Buchmann","year":"2006","unstructured":"Buchmann, J., Garcia, L.C.C., Dahmen, E., D\u00f6ring, M., Klintsevich, E.: CMSS - an improved Merkle signature scheme. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol.\u00a04329, pp. 349\u2013363. Springer, Heidelberg (2006)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M., Das, S.R.: Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF INTERNET DRAFT, MANET working group, Draft-ietfmanet-aodv-13.txt (2003)","DOI":"10.17487\/rfc3561"},{"issue":"3","key":"8_CR6","first-page":"338","volume":"5","author":"S. Kurosawa","year":"2007","unstructured":"Kurosawa, S., et al.: Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. International Journal of Network Security\u00a05(3), 338\u2013346 (2007)","journal-title":"International Journal of Network Security"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-540-39611-6_13","volume-title":"Ad-Hoc, Mobile, and Wireless Networks","author":"J. Zhen","year":"2003","unstructured":"Zhen, J., Srinivas, S.: Preventing Replay Attacks for Secure Routing in Ad Hoc Networks. In: Pierre, S., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2003. LNCS, vol.\u00a02865, pp. 140\u2013150. Springer, Heidelberg (2003)"},{"issue":"1","key":"8_CR8","first-page":"1985","volume":"2","author":"S. Mandala","year":"2008","unstructured":"Mandala, S., Ngadi, M.A., Abdullah, A.H.: A Survey on MANET Intrusion Detection. The International Journal of Computer Science and Security\u00a02(1) (2008) ISSN:1985-1533","journal-title":"The International Journal of Computer Science and Security"},{"key":"8_CR9","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of IEEE INFOCOM 2003 (2003)"},{"issue":"1","key":"8_CR10","doi-asserted-by":"crossref","first-page":"93","DOI":"10.3233\/HSN-2006-279","volume":"15","author":"M.G. Zapata","year":"2006","unstructured":"Zapata, M.G.: Key Management and Delayed Verification for Ad. Hoc Networks. Journal of High Speed Networks\u00a015(1), 93\u2013109 (2006)","journal-title":"Journal of High Speed Networks"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.: A Secure Routing Protocol for Ad hoc Networks. In: Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78\u201389 (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"issue":"6","key":"8_CR12","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1002\/spe.647","volume":"35","author":"R. Barr","year":"2005","unstructured":"Barr, R., Haas, Z.J., Renesse, R.V.: Jist: An efficient approach to simulation using virtual machines. Software. Practice & Experience\u00a035(6), 539\u2013576 (2005)","journal-title":"Software. Practice & Experience"},{"key":"8_CR13","volume-title":"Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks","author":"Rimon Barr","year":"2005","unstructured":"Barr, R., Haas, Z.J., Renesse, R.V.: Scalable Wireless Ad Hoc Network Simulation. In: Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad hoc Wireless, and Peer-to-Peer Networks, Auerbach, ch.\u00a019, pp. 297\u2013311 (2005)"},{"key":"8_CR14","unstructured":"Buchmann, J., Coronado, C., Doring, M., Engelbert, D., Ludwig, C., Overberck, R., Schimidt, A., Vollmer, U.: Post-Quantum signatures (2004) (Preprint)"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.ipl.2008.05.004","volume":"108","author":"R. Stainwandt","year":"2008","unstructured":"Stainwandt, R., Villany, V.I.: A one-time signature using run-length encoding. J. Information Processing Letters\u00a0108, 179\u2013185 (2008)","journal-title":"J. Information Processing Letters"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Computing\u00a026, 1484\u20131509 (1997)","journal-title":"SIAM J. Computing"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1038\/414883a","volume":"414","author":"L.M.K. Vandersypen","year":"2001","unstructured":"Vandersypen, L.M.K., Steffen, M., Breyta, G., Yannoni, C.S., Sherwood, M.H., Chuang, I.L.: Experimental realization of shor\u2019s quantum factoring algorithm using nuclear magnetic resonance. Nature\u00a0414, 883\u2013887 (2001)","journal-title":"Nature"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-72738-5_3","volume-title":"Applied Cryptography and Network Security","author":"J. Buchmann","year":"2007","unstructured":"Buchmann, J., et al.: Merkle signatures with virtually unlimited signature capacity. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 31\u201345. Springer, Heidelberg (2007)"},{"issue":"5","key":"8_CR19","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1137\/S0097539796300933","volume":"26","author":"C.H. Bennet","year":"1997","unstructured":"Bennet, C.H., Bernstein, E.: Strenghsts and waknesses fo quantum computing. SIAM J. Comput.\u00a026(5), 1510\u20131523 (1997)","journal-title":"SIAM J. Comput."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine (2008)","DOI":"10.1109\/MCOM.2008.4473093"},{"key":"8_CR21","unstructured":"Bouncy Castle Provider, http:\/\/www.bouncycastle.org"},{"key":"8_CR22","unstructured":"FlexiProvider, http:\/\/www.cdc.informatik.tu-darmstadt.de\/flexiprovider\/"},{"key":"8_CR23","unstructured":"Courtois, N., Goubin, L., Patarin., J.: SFLASH, a Fast Asymmetric Signature Scheme for low-cost Smartcards \u2013 Primitive Specification and Supporting Documentation, http:\/\/www.minrank.org\/sflash-b-v2.pdf"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Tan, J., Chen, J., Liu, Y.: An Efficient Authentication Strategy for Reprogramming of Sensor Networks. In: Int. conference on Computational Intelligence and Security (2007)","DOI":"10.1109\/CIS.2007.227"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14171-3_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:06:51Z","timestamp":1740179211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14171-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642141706","9783642141713"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14171-3_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}