{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:50:21Z","timestamp":1730224221439,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134357","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["Performance Comparison between IBC-HWMP and Hash-HWMP"],"prefix":"10.1109","author":[{"given":"J.","family":"Ben-Othman","sequence":"first","affiliation":[]},{"given":"L.","family":"Mokdad","sequence":"additional","affiliation":[]},{"given":"Yesica I.","family":"Saavedra Benitez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Ad hoc On&#x2013;Demand Distance Vector (AODV)","author":"perkins","year":"2003","journal-title":"IETF Experimental RFC&#x2013;3561"},{"journal-title":"(Federal Information Processing Standards Publication 180&#x2013;3)","year":"2008","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/941315.941317"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00972-3_15"},{"key":"ref16","first-page":"109","article-title":"Secure Routing for Wireless Mesh Networks","volume":"13","author":"li","year":"2011","journal-title":"International Journal of Network Security"},{"key":"ref17","first-page":"23","article-title":"Ariadne A Secure On&#x2013;Demand Routing Protocol for Ad&#x2013;hoc Networks","author":"hu","year":"2002","journal-title":"MOBICOM'02"},{"key":"ref18","article-title":"Elliptic Curves and Cryptography","author":"juriscic","year":"1997","journal-title":"Dr Dobbs Journal"},{"journal-title":"On Securing HWMP Using IBC","year":"2011","author":"ben-othman","key":"ref19"},{"key":"ref4","article-title":"SEAD (Secure efficient distance vector routing for mobile wireless ad hoc networks)","author":"hu","year":"2002","journal-title":"IEEE Workshop on Mobile Computing Systems and Applications"},{"key":"ref3","article-title":"An Identity&#x2013;Based Security Architecture for Wireless Mesh Network","author":"guangsong","year":"2010","journal-title":"Departament of Information Research Zhengzhou Information Science and Tecnology Institutem Zhengzhou P R China"},{"key":"ref6","first-page":"47","article-title":"Identity based Cryptosystems and Signature Schemes","author":"shamir","year":"1984","journal-title":"CRYPTO'84"},{"journal-title":"SHWMP A Secure Hybrid Wireless Mesh Protocol for IEEE 802 11s Wireless Mesh Network","year":"2009","author":"islam","key":"ref5"},{"journal-title":"The network simulator v 3 (ns&#x2013;3)","year":"0","key":"ref8"},{"key":"ref7","first-page":"213","article-title":"Identify based Encryption from The Weil Pairing","author":"boneh","year":"2001","journal-title":"Crvpto'01"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.58969"},{"journal-title":"IEEE P802 11s\/D4 0 Draft STANDARD for Information Technology-Telecommunications and information exchange between systems- Local and metropolitan area networks- Specific requirements Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 10 Mesh Networking","year":"2009","key":"ref1"},{"key":"ref9","article-title":"Multiprecision Integer and Rational Arithmetic C\/C++ Library (MIRACL)","author":"scott","year":"2003","journal-title":"Shamus Software Ireland"},{"journal-title":"A secure routing protocol for ad hoc networks","year":"0","author":"sanzgiri","key":"ref20"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134357.pdf?arnumber=6134357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T15:52:44Z","timestamp":1490111564000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6134357\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6134357","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}