{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:53:12Z","timestamp":1725594792509},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_85","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T12:41:43Z","timestamp":1309956103000},"page":"631-639","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Power Saving Adaptive Routing (EPSAR) Protocol for Mobile Ad Hoc Networks (MANETs)"],"prefix":"10.1007","author":[{"given":"Ajay","family":"Jangra","sequence":"first","affiliation":[]},{"given":"Nitin","family":"Goel","sequence":"additional","affiliation":[]},{"given":"Chander","family":"Kant","sequence":"additional","affiliation":[]},{"family":"Priyanka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"85_CR1","unstructured":"Sharma, A.K., Goel, A.: Best Neighbor Node Selection Algorithm for MANET. Journals of Institution of Engineers (January 2005)"},{"key":"85_CR2","doi-asserted-by":"crossref","unstructured":"Sharma, A.K., Goel, A.: Moment to Momant Node Transition Awareness Protocol (MOMENTAP). International Journal of Computer Application (IJCA) special issue. IASTED\u00a027(1) (January 2005)","DOI":"10.2316\/Journal.202.2005.1.202-1430"},{"key":"85_CR3","unstructured":"Priyanka, Bhatia, K.K., Jangra, A.: FRENSA: Farthest, Reliable and Efficient Node Selection Algorithm for Mobile Ad-hoc Networks (MANETs). IJCST International Journal of computer Science and Technology\u00a01(2) (December 2010)"},{"key":"85_CR4","unstructured":"Komninos, N., Vergados, D., Douligeris, C.: Detecting unauthorized and compromised nodes in mobile ad hoc networks\u201d see front matter _ 2005 Elsevier B.V. All rights reserved doi:10.1016\/j.adhoc2005.11.005, www.elsevier.com\/locate\/adhoc"},{"issue":"1","key":"85_CR5","first-page":"189","volume":"2","author":"A. Jangra","year":"2010","unstructured":"Jangra, A., Goel, N., Priyanka, Bhatia, K.: Security Aspects in Mobile Ad Hoc Networks (MANETs). A Big Picture International Journal of Electronics Engineering\u00a02(1), 189\u2013196 (2010)","journal-title":"A Big Picture International Journal of Electronics Engineering"},{"key":"85_CR6","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.adhoc.2004.04.012","volume":"4","author":"G. Chakrabarti","year":"2006","unstructured":"Chakrabarti, G., Kulkarni, S.: Load balancing and resource reservation in mobile ad hoc networks. Ad Hoc Networks\u00a04, 186\u2013203 (2006), doi:10.1016\/j.adhoc.2004.04.012","journal-title":"Ad Hoc Networks"},{"key":"85_CR7","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1016\/j.adhoc.2007.11.004","volume":"6","author":"S.A. Razak","year":"2008","unstructured":"Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.: Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks\u00a06, 1151\u20131167 (2008), doi:10.1016\/j.adhoc.2007.11.004","journal-title":"Ad Hoc Networks"},{"key":"85_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.adhoc.2006.07.003","volume":"6","author":"G. Arboit","year":"2008","unstructured":"Arboit, G., Peau, C.C., Davis, C.R., Maheswaran, M.: A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks\u00a06, 17\u201331 (2008), doi:10.1016\/j.adhoc.2006.07.003","journal-title":"Ad Hoc Networks"},{"key":"85_CR9","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.adhoc.2005.11.005","volume":"5","author":"N. Komninos","year":"2007","unstructured":"Komninos, N., Vergados, D., Douligeris, C.: Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks\u00a05, 289\u2013298 (2007), doi:10.1016\/j.adhoc.2005.11.005","journal-title":"Ad Hoc Networks"},{"key":"85_CR10","doi-asserted-by":"crossref","unstructured":"Philip, S.J., Anand, V.: Mobility Aware Path Maintenance in Ad hoc Networks. In: SAC 2009, Honolulu, Hawaii, U.S.A, March 8-12 (2009) Copyright 2009 ACM 978-1-60558-166-8\/09\/03","DOI":"10.1145\/1529282.1529325"},{"key":"85_CR11","doi-asserted-by":"crossref","unstructured":"Mei, A., Stefa, J.: Routing in Outer Space: Fair Traffic Load in Multi-Hop Wireless Networks. In: MobiHoc 2008, Hong Kong SAR, China, May 26\u201330 (2008) Copyright 2008 ACM 978-1-60558-073-9\/08\/05","DOI":"10.1145\/1374618.1374623"},{"key":"85_CR12","volume-title":"Robust and secure routing scheme for wireless multihop network","author":"B. Vaidya","year":"2009","unstructured":"Vaidya, B., Yeo, S.-S., Choi, D.-Y., Han, S.J.: Robust and secure routing scheme for wireless multihop network. Springer, London (2009)"},{"key":"85_CR13","unstructured":"Vasiliou, A., Economides, A.A.: Evalution of multicasting algorithm in MANETs. In: Proceedings of World Acadmy of Science, Engineering and Technology, vol.\u00a05 (April 2005); ISSN 1307-6884"},{"key":"85_CR14","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for AdHoc Networks. In: Proceedings of 10th IEEE International Conference on Network Protocols, ICNP 2002 (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"85_CR15","unstructured":"Yi,S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless AdHoc Networks. University of Illinois at Urbana-Champaign Urbana, IL61801, {seungyi,rhk}@cs.uiuc .edu"},{"key":"85_CR16","doi-asserted-by":"crossref","unstructured":"Madhavi, S., Kim, T.H.: An intrusion detection system in mobile adhoc networks. International Journal of Security and its Applications\u00a02(3) (July 2008)","DOI":"10.1109\/ISA.2008.80"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_85","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T19:51:11Z","timestamp":1560369071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_85"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_85","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}