{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:54:12Z","timestamp":1767138852885,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319041049","type":"print"},{"value":"9783319041056","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-04105-6_13","type":"book-chapter","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T08:27:33Z","timestamp":1388737653000},"page":"197-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CONCEPT: A Service Framework for Secure Ad-Hoc Environments"],"prefix":"10.1007","author":[{"given":"Nuno Solinho","family":"de Azevedo","sequence":"first","affiliation":[]},{"given":"Antonio Duarte","family":"Costa","sequence":"additional","affiliation":[]},{"given":"Joaquim","family":"Macedo","sequence":"additional","affiliation":[]},{"given":"Maria Jo\u00e3o","family":"Nicolau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,4]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Hwang, J.-O., Yoo, C., Min, S.-G.: Analysis of critical points for ip address auto-configuration in ad-hoc networks. In: ICN, pp. 162\u2013166 (2010)","DOI":"10.1109\/ICN.2010.70"},{"key":"13_CR2","first-page":"153","volume":"3","author":"P Ghosekar","year":"2010","unstructured":"Ghosekar, P., Katkar, G., Ghorpade, P.: Mobile ad hoc networking: imperatives and challenges. IJCA Special Issue on MANETs 3, 153\u2013158 (2010)","journal-title":"IJCA Special Issue on MANETs"},{"key":"13_CR3","unstructured":"Kumar, H., Singla, R.K., Malhotra, S.: Issues & trends in autoconfiguration of ip address in manet. Int. J. Comput. Commun. Control (3), 353\u2013357 (2008). ISSN 1841\u20139836"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Gnana Jayanthi, J., Rabara, S.A., Macedo Arokiaraj, A.R.: Ipv6 manet: an essential technology for future, pervasive computing, pp. 466\u2013470 (2010)","DOI":"10.1109\/ICCSN.2010.117"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T., Jinmei, T.: IPv6 stateless address autoconfiguration. RFC 4862 (Draft Standard), September 2007","DOI":"10.17487\/rfc4862"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Nesargi, S., Prakash, R.: Manetconf: configuration of hosts in a mobile ad hoc network. In: IEEE INFOCOM 2002, vol. 2, pp. 1059\u20131068 (2002)","DOI":"10.1109\/INFCOM.2002.1019354"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Xu, T., Wu, J.: Quorum based ip address autoconfiguration in mobile ad hoc networks. In: ICDCSW \u201907, Washington, DC, USA. IEEE CS (2007)","DOI":"10.1109\/ICDCSW.2007.68"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Ahn, S., Lim, Y.: A modified centralized dns approach for the dynamic manet environment. In: ISCIT\u201909, Piscataway, NJ, USA. IEEE (2009)","DOI":"10.1109\/ISCIT.2009.5341020"},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/4236.935181","volume":"5","author":"E Guttman","year":"2001","unstructured":"Guttman, E.: Autoconfiguration for ip networking: enabling local communication. IEEE Internet Comput. 5(3), 81\u201386 (2001)","journal-title":"IEEE Internet Comput."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Jelger, C., Tschudin, C.: Dynamic names and private address maps: complete self-configuration for manets. In: CoNEXT \u201906. ACM (2006)","DOI":"10.1145\/1368436.1368442"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"van der Merwe, J., Dawoud, D., McDonald, S.: Fully self-organized peer-to-peer key management for mobile ad hoc networks. In: 4th ACM Workshop on Wireless Security, WiSe \u201905, pp. 21\u201330. ACM (2005)","DOI":"10.1145\/1080793.1080799"},{"key":"13_CR12","first-page":"47","volume-title":"CRYPTO 1984. LNCS","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"CRYPTO 2001. LNCS","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.entcs.2006.11.008","volume":"171","author":"V Daza","year":"2007","unstructured":"Daza, V., Morillo, P., R\u00e0fols, C.: On dynamic distribution of private keys over manets. Electron. Notes Theor. Comput. Sci. (ENTCS) 171, 33\u201341 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci. (ENTCS)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically Generated Addresses (CGA). RFC 3972 (Proposed Standard), March 2005. Updated by RFCs 4581, 4982","DOI":"10.17487\/rfc3972"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Helal, S., Desai, N., Verma, V., Lee, C.: Konark - a service discovery and delivery protocol for ad-hoc networks. In: WCNC 2003, vol. 3, pp. 2107\u20132113. IEEE, March 2003","DOI":"10.1109\/WCNC.2003.1200712"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Bellavista, P., Corradi, A., Giannelli, C.: The real ad-hoc multi-hop peer-to-peer (ramp) middleware: an easy-to-use support for spontaneous networking. In: IEEE Symposium on ISCC 2010, pp. 463\u2013470, June 2010","DOI":"10.1109\/ISCC.2010.5546785"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Bellavista, P., Corradi, A., Magistretti, E.: Redman: a decentralized middleware solution for cooperative replication in dense manets. In: PerCom 2005 Workshops, pp. 158\u2013162. IEEE, March 2005","DOI":"10.1109\/PERCOMW.2005.67"},{"key":"13_CR19","unstructured":"Collins, J., Bagrodia, R.: Programming in mobile ad hoc networks. In: WICON \u201908, pp. 73:1\u201373:9. ICST, Brussels, Belgium (2008)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Habbal, A.M.M., Hassan, S.: Loss detection and recovery techniques for tcp in mobile ad hoc network. In: 2010 (NETAPPS), pp. 48\u201354, September 2010","DOI":"10.1109\/NETAPPS.2010.16"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1189740.1189742","volume":"7","author":"S Ceri","year":"2007","unstructured":"Ceri, S., Daniel, F., Matera, M., Facca, F.M.: Model-driven development of context-aware web applications. ACM Trans. Internet Technol. 7, 1\u201332 (2007)","journal-title":"ACM Trans. Internet Technol."},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Ahrenholz, J., Danilov, C., Henderson, T.R., Kim, J.H.: Core: a real-time network emulator. In: Military Communications Conference, MILCOM 2008, pp. 1\u20137. IEEE, November 2008","DOI":"10.1109\/MILCOM.2008.4753614"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04105-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T06:48:20Z","timestamp":1746082100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-04105-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319041049","9783319041056"],"references-count":22,"aliases":["10.1007\/978-3-319-14225-8_13"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04105-6_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"4 January 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}