{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:49Z","timestamp":1725889909529},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642240812"},{"type":"electronic","value":"9783642240829"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24082-9_20","type":"book-chapter","created":{"date-parts":[[2011,9,20]],"date-time":"2011-09-20T07:31:55Z","timestamp":1316503915000},"page":"162-174","source":"Crossref","is-referenced-by-count":0,"title":["The Design of Reliable Routing Protocols in Wireless Mesh Networks"],"prefix":"10.1007","author":[{"given":"Chang-Pyo","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Jae-Wan","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Hyun-Jong","family":"Cha","sequence":"additional","affiliation":[]},{"given":"Ho-Kyung","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hwang-Bin","family":"Ryou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Akyildiz, I.F., Wang, X.: A Survey on Wireless Mesh Networks. IEEE Radio Communications, 23\u201330 (September 2005)","DOI":"10.1109\/MCOM.2005.1509968"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Salonidis, T., Garetto, M., Saha, A., Knightly, E.: Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach. In: IEEE ICNP 2007, pp. 21\u201330 (2007)","DOI":"10.1109\/ICNP.2007.4375833"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proc.1st IEEE, Wksp. Sensor Network Protocols and Applications (May 2003)","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Choi, S., Kim, D.-Y., Lee, D.-H., Jung, J.-I.: WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks. In: IEEE International Conference on SUTC, pp. 343\u2013348 (2008)","DOI":"10.1109\/SUTC.2008.49"},{"key":"20_CR5","unstructured":"RFC 2402, IP Authenticaion Header, IETF IPSec WG (1998), http:\/\/www.potaroo.net\/ietf\/retf2402\/"},{"key":"20_CR6","unstructured":"RFC 3029: Internet X.509 Public Infrastructure Data Validation and Certification Server Protocols. IETF PKIX Working Group (February 2001)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Murata, T., Ishibuchi, H.: Performance evaluation of genetic algorithms for flowshop scheduling problems. In: Proc. 1st IEEE Conf. Evolutionary Computation, vol.\u00a02,","DOI":"10.1109\/ICEC.1994.349951"},{"key":"20_CR8","volume-title":"Cryptography and Network Security","author":"B.A. Forouzan","year":"2008","unstructured":"Forouzan, B.A.: Cryptography and Network Security. Mcgraw-Hill International, New York (2008)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message-digest algorithm. Internet Request for Comments, RFC 1321 (April 1992)","DOI":"10.17487\/rfc1321"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Dankers, J., Garefalakis, T., Schafflhofer, R., Wright, T.: Public Key Infrastructure in mobile systems. Electronics & Communication Engineering Journal, 180\u2013190 (October 2002)","DOI":"10.1049\/ecej:20020501"}],"container-title":["Lecture Notes in Computer Science","Convergence and Hybrid Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24082-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T21:52:29Z","timestamp":1560635549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24082-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642240812","9783642240829"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24082-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}