{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:33:23Z","timestamp":1743132803592,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315121"},{"type":"electronic","value":"9783642315138"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31513-8_17","type":"book-chapter","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T09:39:17Z","timestamp":1340962757000},"page":"159-169","source":"Crossref","is-referenced-by-count":1,"title":["SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN"],"prefix":"10.1007","author":[{"given":"Sujoy","family":"Saha","sequence":"first","affiliation":[]},{"given":"Rohit","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Satadal","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Vineet","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Subrata","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Fall, K.: A Delay Tolerant Network Architecture for Challenged Internets. In: Proc. ACM SIGCOMM, pp. 27\u201334 (2003)","DOI":"10.1145\/863955.863960"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., et al.: Spray & Focus: Efficient Mobility-Assisted Routing For Heterogeneous & Correlated Mobility. In: Proc. Fifth IEEE PERCOM Workshops 2007 (2007)","DOI":"10.1109\/PERCOMW.2007.108"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Lindgreny: Probabilistic Routing in Intermittently Connected Networks. In: Proc. ACM SIGMOBILE Mobile Computing & Communications Review, vol.\u00a07 (July 2003)","DOI":"10.1145\/961268.961272"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Burgess, J., et al.: Maxprop: Routing for vehicle-based disruption-tolerant networking. In: Proc. INFOCOM (April 2006)","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Kernen, et al.: The ONE Simulator for DTN Protocol Evaluation. In: Proc. of the 2nd Int\u2018l Conf. on Simulation Tools & Techniques, Simutools 2009, Belgium (2009)","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Chuah, M., et al.: A Ferry based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks. In: Proc. MOBIQUITOUS (August 2007)","DOI":"10.1109\/MOBIQ.2007.4451068"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Ren, Y., et al.: MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks. In: Proc. IEEE WCNC (2010)","DOI":"10.1109\/WCNC.2010.5506574"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Li, F., et al.: Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets. In: Proc. INFOCOM (2009)","DOI":"10.1109\/INFCOM.2009.5062170"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Ren, Y., et al.: Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording. In: Proc. IEEE WoWMoM (2010)","DOI":"10.1109\/WOWMOM.2010.5534944"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Zhu, H., et al.: SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Trans. on Vehicular Tech.\u00a058 (October 2009)","DOI":"10.1109\/TVT.2009.2020502"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Lu, R., et al.: Pi: A Practical Incentive Protocol for Delay Tolerant Networks. IEEE Trans. on Wireless Communications\u00a09(4) (April 2010)","DOI":"10.1109\/TWC.2010.04.090557"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Li, Q., et al.: Routing in Socially Selfish Delay Tolerant Networks. In: Proc. of INFOCOM, pp. 857\u2013865 (2010)","DOI":"10.1109\/INFCOM.2010.5462138"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Ning, T., et al.: Incentive-Aware Data Dissemination in Delay-Tolerant Mobile Networks. In: Proc. of SECON (2011)","DOI":"10.1109\/SAHCN.2011.5984940"},{"key":"17_CR14","unstructured":"Saha, S., et al.: Secured Routing in DTNs: Threats & Counter-measures. In: Ph.D. Forum, ICDCN (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31513-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T03:10:37Z","timestamp":1676776237000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-31513-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642315121","9783642315138"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31513-8_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2012]]}}}