{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:44:44Z","timestamp":1730195084909,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387079","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T15:16:50Z","timestamp":1112368610000},"page":"458-464","source":"Crossref","is-referenced-by-count":1,"title":["Cooperative cashing techniques for increasing the availability of MANET certificate authority services"],"prefix":"10.1109","author":[{"given":"L.A.","family":"Al-Sulaiman","sequence":"first","affiliation":[]},{"given":"H.","family":"Abdel-Wahab","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Securing ad-hoc networks","author":"zhou","year":"1999","journal-title":"IEEE Network Magazine"},{"key":"13","article-title":"APSS: Proactive secret sharing in asynchronous systems","author":"zhou","year":"2002","journal-title":"TR 2002-1877 Computer Science Department Cornell Univerisity Ithaca NY USA"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/571637.571638"},{"year":"0","journal-title":"The network simulator- ns-2","key":"11"},{"key":"12","article-title":"MOCA: Mobile certificate authority for wireless ad-hoc networks","author":"yi","year":"2003","journal-title":"2nd Annu PKI Research Workshop"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/584490.584508"},{"key":"2","first-page":"120","article-title":"Society and group oriented cryptography: A new concept","volume":"293","author":"desmedt","year":"1988","journal-title":"Advances in Cryptology Crypto '87proceedings Number 293 in LNCS"},{"key":"1","article-title":"The dynamic source routing protocol for mobile ad-hoc networks","author":"broch","year":"2003","journal-title":"IETF Internet Draft"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/359168.359176"},{"key":"7","first-page":"251","article-title":"Providing robust and ubiquitous security support for mobile ad-hoc networks","author":"kong","year":"2001","journal-title":"Pro ICNP 01"},{"year":"1995","author":"jarecki","journal-title":"Proactive Secret Sharing and Public Key Cryptosystems","key":"6"},{"year":"0","journal-title":"Technical Summary","article-title":"Intel\ufffd XScale? microarchitecture","key":"5"},{"key":"4","article-title":"Wireless ad-hoc networks","author":"haas","year":"2002","journal-title":"Encyclopedia of Telecommunications"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/MCSA.1999.749281"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/112600.112605"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387079.pdf?arnumber=1387079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T23:59:22Z","timestamp":1489535962000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2005.1387079","relation":{},"subject":[]}}