{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T23:10:07Z","timestamp":1750029007399,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_23","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T07:13:45Z","timestamp":1488438825000},"page":"227-233","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of Secure Routing Among Authenticated Nodes in MANETs"],"prefix":"10.1007","author":[{"given":"Rajeev","family":"Ranjan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Advanced communications and multimedia security (Springer, 2002), pp. 107\u2013121","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"S. Buchegger, J.-Y. Le\u00a0Boudec, Performance analysis of the confidant protocol, in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (ACM, 2002), pp. 226\u2013236","DOI":"10.1145\/513824.513828"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, M. Jakobsson, Almost optimal hash sequence traversal, in Financial Cryptography (Springer, 2002), pp 102\u2013119","DOI":"10.1007\/3-540-36504-4_8"},{"issue":"8","key":"23_CR4","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1016\/S1389-1286(98)00022-X","volume":"31","author":"Ralf Hauser","year":"1999","unstructured":"Ralf Hauser, Tony Przygienda, Gene Tsudik, Lowering security overhead in link state routing. Comput. Netw. 31(8), 885\u2013894 (1999)","journal-title":"Comput. Netw."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"D.B. Johnson, Routing in ad hoc networks of mobile hosts, in First Workshop on Mobile Computing Systems and Applications, WMCSA 1994. (IEEE, 1994), pp. 158\u2013163","DOI":"10.1109\/WMCSA.1994.33"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"W. Su, M. Gerla, Ipv6 flow handoff in ad hoc wireless networks using mobility prediction, inGlobal Telecommunications Conference, 1999. GLOBECOM\u201999, vol.\u00a01 (IEEE, 1999), pp 271\u2013275","DOI":"10.1109\/GLOCOM.1999.831647"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, L. Viennot, Optimized link state routing protocol (olsr) (2003)","DOI":"10.17487\/rfc3626"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers, in textitACM SIGCOMM Computer Communication Review, vol. 24 (ACM, 1994), pp. 234\u2013244","DOI":"10.1145\/190809.190336"},{"key":"23_CR9","unstructured":"D.B Johnson, The dynamic source routing protocol for mobile ad hoc networks. draft-ietf-manet-dsr-09.txt (2003)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"E.M. Royer, C.E. Perkins, Multicast operation of the ad-hoc on-demand distance vector routing protocol, in Proceedings of the 5th annual ACM\/IEEE International Conference on Mobile Computing and Networking (ACM, 1999), pp. 207\u2013218","DOI":"10.1145\/313451.313538"},{"key":"23_CR11","unstructured":"Z.J. Haas, M.R. Pearlman, P. Samar, The zone routing protocol (zrp) for ad hoc networks (2002)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"D. Boneh, M. Franklin, Identity-based encryption from the weil pairing, in Advances in Cryptology CRYPTO 2001 (Springer, 2001), pp. 213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"3","key":"23_CR13","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.adhoc.2004.03.011","volume":"2","author":"Muhammad Bohio","year":"2004","unstructured":"Muhammad Bohio, Ali Miri, Efficient identity-based security schemes for ad hoc network routing protocols. Ad hoc Netw. 2(3), 309\u2013317 (2004)","journal-title":"Ad hoc Netw."},{"issue":"3","key":"23_CR14","doi-asserted-by":"crossref","first-page":"1046","DOI":"10.1016\/j.adhoc.2012.11.005","volume":"11","author":"S Zhao","year":"2013","unstructured":"S. Zhao, R. Kent, A. Aggarwal, A key management and secure routing integrated framework for mobile ad-hoc networks. Ad Hoc Netw. 11(3), 1046\u20131061 (2013)","journal-title":"Ad Hoc Netw."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T22:50:53Z","timestamp":1750027853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}