{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:55:28Z","timestamp":1730231728824,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icc.2003.1204143","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T09:34:28Z","timestamp":1079948068000},"page":"61-65","source":"Crossref","is-referenced-by-count":3,"title":["Modeling energy efficient secure wireless networks using network simulation"],"prefix":"10.1109","volume":"1","author":[{"given":"R.","family":"Karri","sequence":"first","affiliation":[]},{"given":"P.","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/65.953234"},{"key":"ref11","article-title":"Improving simulation for network research","author":"bajaj","year":"1999","journal-title":"IEEE Computer"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2001.156139"},{"year":"0","key":"ref13"},{"journal-title":"OPNETWORK","article-title":"Predicting wireless LAN (802.11) performance","year":"2001","key":"ref14"},{"journal-title":"The Network Simulator-ns-2","year":"0","key":"ref15"},{"journal-title":"Global Mobile Information Systems Simulation Library (GloMoSim)","year":"0","key":"ref16"},{"journal-title":"XILINX Power estimation tool","year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/43.736181"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/92.335013"},{"year":"0","key":"ref6","article-title":"Symbol Technologies Inc"},{"key":"ref5","article-title":"Software design for low power","author":"roy","year":"1996","journal-title":"Technical Report"},{"journal-title":"Tektronix Inc","year":"0","key":"ref8"},{"year":"0","key":"ref7","article-title":"Annapolis Micro Systems"},{"key":"ref2","article-title":"Optimizing the energy consumed by secure wireless session-Wireless Transport Layer Security case study","volume":"8","author":"karri","year":"2003","journal-title":"Journal of Mobile Networks and Applications Special Issue on Security ACM\/Kluwer Publications"},{"key":"ref1","article-title":"Encryption advances to meet Internet challenges","author":"clark","year":"2000","journal-title":"IEEE Computer Magazine Online"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2002.997209"}],"event":{"name":"IEEE International Conference on Communications","acronym":"ICC-03","location":"Anchorage, AK, USA"},"container-title":["IEEE International Conference on Communications, 2003. ICC '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8564\/27113\/01204143.pdf?arnumber=1204143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:11:23Z","timestamp":1489428683000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1204143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc.2003.1204143","relation":{},"subject":[]}}