{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:10:32Z","timestamp":1725653432229},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1109\/glocom.2009.5425805","type":"proceedings-article","created":{"date-parts":[[2010,3,8]],"date-time":"2010-03-08T16:49:02Z","timestamp":1268066942000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["A Group-Based Key Management Protocol for Mobile Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Qing","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Sherman","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Kazuo","family":"Hashimoto","sequence":"additional","affiliation":[]},{"given":"Nei","family":"Kato","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"ref12","article-title":"Moca: Mobile Certificate Authority for Wireless Ad Hoc Networks","author":"yi","year":"2003","journal-title":"2nd Annual PKI Research Workshop"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11943952_36"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.212"},{"article-title":"The Algorithm Design Manual","year":"1998","author":"skiena","key":"ref15"},{"article-title":"The Clique Algorithm","year":"0","author":"dharwadker","key":"ref16"},{"journal-title":"QualNet Simulator (version 4)","year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref2","first-page":"28","article-title":"A Survey of Secure Wireless Ad Hoc Routing","author":"hu","year":"2004","journal-title":"IEEE Security & Privacy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.904002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6270-4_59"}],"event":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","start":{"date-parts":[[2009,11,30]]},"location":"Honolulu, Hawaii","end":{"date-parts":[[2009,12,4]]}},"container-title":["GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5425207\/5425208\/05425805.pdf?arnumber=5425805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T04:32:30Z","timestamp":1489897950000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5425805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/glocom.2009.5425805","relation":{},"subject":[],"published":{"date-parts":[[2009,11]]}}}