{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:04:38Z","timestamp":1767989078576,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642207563","type":"print"},{"value":"9783642207570","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20757-0_25","type":"book-chapter","created":{"date-parts":[[2011,4,28]],"date-time":"2011-04-28T01:49:00Z","timestamp":1303955340000},"page":"319-330","source":"Crossref","is-referenced-by-count":7,"title":["Optimal Node Placement in Distributed Wireless Security Architectures"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Martignon","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Paris","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Capone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"25_CR1","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.comnet.2005.01.002","volume":"47","author":"I.F. Akyildiz","year":"2005","unstructured":"Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Elsevier Computer Networks\u00a047(4), 445\u2013487 (2005)","journal-title":"Elsevier Computer Networks"},{"key":"25_CR2","unstructured":"IEEE Standard 802.11i. Medium Access Control (MAC) security enhancements, amendment 6. IEEE Computer Society (2004)"},{"issue":"10","key":"25_CR3","doi-asserted-by":"publisher","first-page":"1916","DOI":"10.1109\/JSAC.2006.877223","volume":"24","author":"Y. Zhang","year":"2006","unstructured":"Zhang, Y., Fang, Y.: Arsa: An attack-resilient security architecture for multihop wireless mesh networks. IEEE Journal on Selected Areas in Communications\u00a024(10), 1916\u20131928 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"12","key":"25_CR4","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1016\/j.comnet.2009.04.002","volume":"53","author":"F. Martignon","year":"2009","unstructured":"Martignon, F., Paris, S., Capone, A.: Design and Implementation of MobiSEC: a Complete Security Architecture for Wireless Mesh Networks. Elsevier Computer Networks\u00a053(12), 2192\u20132207 (2009)","journal-title":"Elsevier Computer Networks"},{"key":"25_CR5","unstructured":"Yi, S., Kravets, R.: Moca: Mobile certificate authority for wireless ad hoc networks. In: Annual PKI Research Workshop, PKI 2003 (2003)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Kim, J., Bahk, S.: Meca: Distributed certification authority in wireless mesh networks. In: IEEE CCNC, pp. 267\u2013271 (2008)","DOI":"10.1109\/ccnc08.2007.66"},{"issue":"3","key":"25_CR7","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1002\/sec.181","volume":"4","author":"F. Martignon","year":"2011","unstructured":"Martignon, F., Paris, S., Capone, A.: DSA-Mesh: a Distributed Security Architecture for Wireless Mesh Networks. Wiley Security and Communication Networks\u00a04(3), 242\u2013256 (2011)","journal-title":"Wiley Security and Communication Networks"},{"key":"25_CR8","unstructured":"Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. In: IEEE ISCC, pp. 567\u2013574 (2002)"},{"key":"25_CR9","unstructured":"Xu, G., Iftode, L.: Locality driven key management architecture for mobile ad-hoc networks. In: IEEE MASS, pp. 436\u2013446 (2004)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-organized public-key management for mobile ad hoc networks. IEEE Trans. on Mobile Computing, 52\u201364 (2003)","DOI":"10.1109\/TMC.2003.1195151"},{"key":"25_CR11","unstructured":"Wua, B., Wua, J., Fernandeza, E.B., Ilyasa, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. In: IEEE IPDPS (2005)"},{"issue":"12","key":"25_CR12","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1057\/jors.1978.263","volume":"29","author":"R.M. Nauss","year":"1978","unstructured":"Nauss, R.M.: An improved algorithm for the capacitated facility location problem. Journal of the Operational Research Society\u00a029(12), 1195\u20131201 (1978)","journal-title":"Journal of the Operational Research Society"},{"issue":"11","key":"25_CR13","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1109\/JSAC.2006.881606","volume":"24","author":"B. Aoun","year":"2006","unstructured":"Aoun, B., Boutaba, R., Iraqi, Y., Kenward, G.: Gateway placement optimization in wireless mesh networks with QoS constraints. IEEE Journal on Selected Areas in Communications\u00a024(11), 2127\u20132136 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Targon, V., Sans\u00f2, B., Capone, A.: The joint Gateway Placement and Spatial Reuse Problem in Wireless Mesh Networks. Computer Networks (2009)","DOI":"10.1016\/j.comnet.2009.05.019"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"He, B., Xie, B., Agrawal, D.P.: Optimizing the Internet gateway deployment in a wireless mesh network. In: IEEE MASS (2007)","DOI":"10.1109\/MOBHOC.2007.4428603"},{"issue":"11","key":"25_CR16","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1016\/j.comnet.2008.02.020","volume":"52","author":"E. Amaldi","year":"2008","unstructured":"Amaldi, E., Capone, A., Cesana, M., Filippini, I., Malucelli, F.: Optimization models and methods for planning wireless mesh networks. Computer Networks\u00a052(11), 2159\u20132171 (2008)","journal-title":"Computer Networks"},{"issue":"1","key":"25_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0304-3975(98)00222-9","volume":"242","author":"S. Khuller","year":"2000","unstructured":"Khuller, S., Pless, R., Sussmann, Y.J.: Fault tolerant k-center problems. Theoretical Computer Science\u00a0242(1), 237\u2013246 (2000)","journal-title":"Theoretical Computer Science"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20757-0_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:00:17Z","timestamp":1606186817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20757-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207563","9783642207570"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20757-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}