{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:25:34Z","timestamp":1725546334638},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/comsnets.2018.8328218","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T16:45:17Z","timestamp":1522687517000},"page":"348-355","source":"Crossref","is-referenced-by-count":0,"title":["Distributed access control in wireless networks"],"prefix":"10.1109","author":[{"given":"Mahmoud","family":"Taghizadeh","sequence":"first","affiliation":[]},{"given":"Amir R.","family":"Khakpour","sequence":"additional","affiliation":[]},{"given":"Faezeh","family":"Hajiaghajani","sequence":"additional","affiliation":[]},{"given":"Alex X.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Subir","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2388576.2388582"},{"key":"ref11","article-title":"Secure address auto-con.guration for mobile ad hoc networks","author":"pan","year":"2005","journal-title":"Proc Mobiquitous"},{"journal-title":"The network simulator-NS2","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"key":"ref4","article-title":"Mesh network firewalling with bloom filters","author":"leonardo","year":"2007","journal-title":"Proc ICC"},{"key":"ref3","first-page":"367","author":"dillinger","year":"2004","journal-title":"Bloom Filters in Probabilistic Verification"},{"journal-title":"Epic Efficient path-independent capabilities in mobile ad hoc networks- design performance and security","year":"2013","author":"swankoski","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-225"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.27"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935206"},{"key":"ref9","article-title":"An access control framework for semi-infrastructured ad hoc networks","author":"soumya","year":"2010","journal-title":"Proceedings of the 2nd International Conference on Computer Technology and Development (ICCTD 2010)"}],"event":{"name":"2018 10th International Conference on Communication Systems & Networks (COMSNETS)","start":{"date-parts":[[2018,1,3]]},"location":"Bengaluru","end":{"date-parts":[[2018,1,7]]}},"container-title":["2018 10th International Conference on Communication Systems &amp; Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8325363\/8328170\/08328218.pdf?arnumber=8328218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T02:00:21Z","timestamp":1643162421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8328218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2018.8328218","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}