{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T18:11:58Z","timestamp":1760724718217,"version":"build-2065373602"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Proof of Concept Foundation of Hangzhou Institute of Technology, Xidian University","award":["GNYZ2023GY0205"],"award-info":[{"award-number":["GNYZ2023GY0205"]}]},{"DOI":"10.13039\/501100008656","name":"Significant Science and Technology Project of Xiaoshan District","doi-asserted-by":"publisher","award":["2023111"],"award-info":[{"award-number":["2023111"]}],"id":[{"id":"10.13039\/501100008656","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2024.3409160","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T13:41:58Z","timestamp":1717422118000},"page":"177185-177201","source":"Crossref","is-referenced-by-count":0,"title":["Modeling and Analysis of Secure Ad Hoc Routing Protocol SRP"],"prefix":"10.1109","volume":"13","author":[{"given":"Shicong","family":"Zhang","sequence":"first","affiliation":[{"name":"National (Hangzhou) Novel Internet Exchange, Hangzhou, China"}]},{"given":"Chenhui","family":"Gu","sequence":"additional","affiliation":[{"name":"National (Hangzhou) Novel Internet Exchange, Hangzhou, China"}]},{"given":"Huanyu","family":"Zhou","sequence":"additional","affiliation":[{"name":"National (Hangzhou) Novel Internet Exchange, Hangzhou, China"}]},{"given":"Yisha","family":"Liu","sequence":"additional","affiliation":[{"name":"National (Hangzhou) Novel Internet Exchange, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5785-4379","authenticated-orcid":false,"given":"Wanli","family":"Huo","sequence":"additional","affiliation":[{"name":"College of Information Engineering, China Jiliang University, Hangzhou, China"}]},{"given":"Chunyan","family":"Fu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, China Jiliang University, Hangzhou, China"}]},{"given":"Zhaojuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, China Jiliang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190336"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-33112-6_5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4543-0_62"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"ref8","first-page":"193","article-title":"Secure routing for mobile ad hoc networks","volume-title":"Proc. SCS Commun. Netw. Distrib. Syst. Modelling Simulation Conf. (CNDS)","author":"Papadimitratos"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.170"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592436"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36830-1_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-017-0463-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2006.4374344"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029119"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_10"},{"key":"ref17","first-page":"9","article-title":"Automated security analysis of ad hoc routing protocols","volume-title":"Proc. Joint Workshop Found. Comput. Secur. Automated Reasoning Secur. Protocol Anal.","author":"Andel"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85114-1_5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2010.24"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.036"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2014.07.004"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139195881","volume-title":"Modeling in Event-B System and Software Engineering","author":"Abrial","year":"2010"},{"volume-title":"The B-Book: Assigning Programs to Meanings","year":"2005","author":"Abrial","key":"ref23"},{"volume-title":"The Event-B Mathematical Language","year":"2009","author":"M\u00e9tayer","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1456396.1456400"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.17"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10547064.pdf?arnumber=10547064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T17:42:32Z","timestamp":1760722952000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10547064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3409160","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}