{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:43:13Z","timestamp":1742917393655,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164439"},{"type":"electronic","value":"9783642164446"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16444-6_13","type":"book-chapter","created":{"date-parts":[[2010,9,9]],"date-time":"2010-09-09T03:19:29Z","timestamp":1284002369000},"page":"86-95","source":"Crossref","is-referenced-by-count":4,"title":["Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers"],"prefix":"10.1007","author":[{"given":"Azeem","family":"Irshad","sequence":"first","affiliation":[]},{"given":"Wajahat","family":"Noshairwan","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shafiq","sequence":"additional","affiliation":[]},{"given":"Shahzada","family":"Khurram","sequence":"additional","affiliation":[]},{"given":"Ehtsham","family":"Irshad","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Usman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/nem.603","volume":"17","author":"Y.M. Tseng","year":"2006","unstructured":"Tseng, Y.M.: A heterogeneous-network aided public-key management scheme for MANETS. Int. J. Net. Mgmt.\u00a017, 3\u201315 (2006)","journal-title":"Int. J. Net. Mgmt."},{"issue":"1","key":"13_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TMC.2003.1195151","volume":"2","author":"S. Capkun","year":"2003","unstructured":"Capkun, S., Buttyan, L., Hubaux, J.P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing\u00a02(1), 52\u201364 (2003)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"13_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Net. J.\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Net. J."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Brandt, I., rd, D., Landrock, P., Pedersen, T.: Zero-Knowledge Authentication Scheme with Secret Key Exchange. Journal of Cryptology (1998)","DOI":"10.1007\/s001459900041"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: IEEE (ICNP 2001), pp. 251\u2013260 (November 2001)","DOI":"10.1109\/ICNP.2001.992905"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol.\u00a01796, p. 204. Springer, Heidelberg (2000)","DOI":"10.1007\/10720107_24"},{"key":"13_CR7","unstructured":"Pirzada, A., Mc Donald, C.: Kerberos Assisted Authentication in Mobile Ad-hoc Networks. In: The 27th Australasian Computer Science Conference (2004)"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","first-page":"6","volume-title":"Information Security and Cryptology - ICISC 2001","author":"A. Weimerskirch","year":"2001","unstructured":"Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-hoc Networks. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 6\u20137. Springer, Heidelberg (2001)"},{"key":"13_CR9","unstructured":"Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pair wise keys for secure communication in ad hoc networks: a probabilistic approach. In: The 11th IEEE International Conference on Network Protocols (2003)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Wu, X., Sidiroglou, S.: Ubiquitous Computing in Home Networks. IEEE Commun. Mag., 128\u2013135 (November 2003)","DOI":"10.1109\/MCOM.2003.1244933"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Hui, S.Y., Yeung, K.H.: Challenges in the Migration to 4G Mobile Systems. IEEE Commun. Mag., 54\u201359 (December 2003)","DOI":"10.1109\/MCOM.2003.1252799"},{"issue":"5","key":"13_CR12","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.comcom.2003.10.005","volume":"27","author":"V. Varadharajan","year":"2004","unstructured":"Varadharajan, V., Shankaran, R., Hitchens, M.: Security for cluster based ad hoc networks. Computer Communications\u00a027(5), 488\u2013501 (2004)","journal-title":"Computer Communications"}],"container-title":["Communications in Computer and Information Science","Security-Enriched Urban Computing and Smart Grid"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16444-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T17:22:00Z","timestamp":1740504120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16444-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164439","9783642164446"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16444-6_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}