{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:39:08Z","timestamp":1725745148247},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405969"},{"type":"electronic","value":"9783642405976"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40597-6_4","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T06:00:13Z","timestamp":1376460013000},"page":"44-53","source":"Crossref","is-referenced-by-count":0,"title":["Hardware Advancements Effects on MANET Development, Application and Research"],"prefix":"10.1007","author":[{"given":"Amr","family":"ElBanna","sequence":"first","affiliation":[]},{"given":"Ehab","family":"ElShafei","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"ElSabrouty","sequence":"additional","affiliation":[]},{"given":"Marianne A.","family":"Azer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Kwang-Ting, C., Yi-Chu, W.: Using mobile GPU for general-purpose computing; a case study of face recognition on smartphones. In: International Symposium on VLSI Design, Automation and Test (VLSI-DAT), Hsinchu, pp. 91\u201397 (2011)","DOI":"10.1109\/VDAT.2011.5783575"},{"key":"4_CR2","unstructured":"Collective information gathered from the manufacture\u2019s websites (2013) and other tech sites, \n                    \n                      http:\/\/www.apple.com\n                    \n                    \n                  , \n                    \n                      http:\/\/www.samsug.com\n                    \n                    \n                  , \n                    \n                      http:\/\/www.htc.com\n                    \n                    \n                  , \n                    \n                      http:\/\/www.gsmarena.com\n                    \n                    \n                   and \n                    \n                      http:\/\/www.thephonedatabase.com\n                    \n                    \n                   (accessed March 15, 2013)"},{"key":"4_CR3","unstructured":"Shah, A.: Samsung laying groundwork for server chips, Analysts Say (2012), \n                    \n                      http:\/\/www.computerworld.com.au\/article\/441253\/samsung_laying_groundwork_server_chips_analysts_say\/\n                    \n                    \n                   (accessed March 25, 2013)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Moore, G.E.: Cramming More Components Onto Integrated Circuits. In: Proceedings of the IEEE Solid-State Circuits Society Newsletter, vol. 86, pp. 82\u201385 (1998)","DOI":"10.1109\/JPROC.1998.658762"},{"key":"4_CR5","unstructured":"Nguyen, V., Hao, S., Szajman, J.: WiiKey: An Innovative Smartphone Based Wi-Fi Application. In: International Multisymposiums Computer and Computational Sciences, IMSCCS 2008, Shanghai, pp. 91\u201397 (2008)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Perrucci, G.P., Fitzek, F.H.P., Widmer, J.: Survey on Energy Consumption Entities on the Smartphone Platform. In: IEEE 73rd Vehicular Technology Conference (VTC Spring), Yokohama, vol.\u00a015, pp. 5\u201320 (2011)","DOI":"10.1109\/VETECS.2011.5956528"},{"key":"4_CR7","unstructured":"Kalic, G., Bojic, I., Kusek, M.: Energy consumption in android phones when using wireless communication technologies. In: Proceedings of the 35th International Convention MIPRO, Opatija, pp. 754\u2013759 (2012)"},{"key":"4_CR8","unstructured":"Gardner-Stephen, P.: Serval Project Developers (2010), \n                    \n                      http:\/\/developer.servalproject.org\/site\/\n                    \n                    \n                   (accessed April 10 , 2013)"},{"key":"4_CR9","unstructured":"Johnson, D., Ntlatlapa, N., Aichele, C.: A simple pragmatic approach to mesh routing using BATMAN. In: 2nd IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries, Pretoria, South Africa (2008)"},{"key":"4_CR10","unstructured":"(CoCo), C.C.C., Next Generation Networking (2012), \n                    \n                      http:\/\/www.cococorp.com\n                    \n                    \n                   (accessed April 30, 2013)"},{"key":"4_CR11","unstructured":"Safdar, G.A., McGrath, C., McLoone, M.: Limitations of existing wireless networks authentication and key management techniques for MANETs. In: International Symposium Computer Networks, Istanbul, pp. 101\u2013105 (2006)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Macintosh, A., et al.: Local Area Network Dynamic (LANDY) routing protocol: A position based routing protocol for MANET. In: 18th European Wireless Conference, European Wireless, EW 2012, Poznan, Poland, pp. 1\u20139 (2012)","DOI":"10.7321\/jscse.v2.n7.2"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Crawley, E., et al.: A framework for QoS-based routing in the internet, RFC (1998)","DOI":"10.17487\/rfc2386"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MWC.2004.1269717","volume":"11","author":"A. Mishra","year":"2004","unstructured":"Mishra, A., Nadkarni, K., Patcha, A.: Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications\u00a011, 48\u201360 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"4_CR15","unstructured":"Panos, C., Xenakis, C., Stavrakakis, I.: A novel Intrusion Detection System for MANETs. In: Proceedings of International Conference on Security and Cryptography, SECRYPT, Athens, pp. 1\u201310 (2010)"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/TIE.2012.2196010","volume":"60","author":"E.M. Shakshuki","year":"2013","unstructured":"Shakshuki, E.M., Nan, K., Sheltami, T.R.: A Secure Intrusion-Detection System for MANETs. IEEE Transactions on Industrial Electronics\u00a060, 1089\u20131098 (2013)","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Selby, A., Mitchell, C.: Algorithms for software implementations of RSA. In: IEEE Proceedings Computers and Digital Techniques, vol.\u00a0136, pp. 166\u2013170 (1989)","DOI":"10.1049\/ip-e.1989.0023"},{"key":"4_CR18","unstructured":"Seys, S., Preneel, B.: Power consumption evaluation of efficient digital signature schemes for low power devices. In: IEEE International Conference Wireless and Mobile Computing, Networking and Communications, WiMob 2005, vol.\u00a01, pp. 79\u201386 (2005)"}],"container-title":["Communications in Computer and Information Science","Advances in Security of Information and Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40597-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T11:33:02Z","timestamp":1558006382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40597-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405969","9783642405976"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40597-6_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}