{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:06:58Z","timestamp":1730232418787,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/icc.2011.5962921","type":"proceedings-article","created":{"date-parts":[[2011,8,3]],"date-time":"2011-08-03T21:44:20Z","timestamp":1312407860000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["On Securing HWMP Using IBC"],"prefix":"10.1109","author":[{"given":"Jalel","family":"Ben-Othman","sequence":"first","affiliation":[]},{"given":"Yesica I.","family":"Saavedra Benitez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Security Issues in Wireless Mesh Networks","author":"zhang","year":"2008","journal-title":"Book Wireless Mesh Networks Architectures and protocols"},{"year":"2009","key":"ref11"},{"key":"ref12","first-page":"28","article-title":"A Survey of Secure Wireless Ad Hoc Routing","author":"hu","year":"2004","journal-title":"IEEE Security Privacy"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055927"},{"key":"ref16","article-title":"SWAN: A Secured Watchdog for Ad hoc Networks","volume":"6","author":"xue","year":"2006","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref17","first-page":"310","article-title":"Efficient identity based signature schemes based on pairings","author":"hess","year":"2003","journal-title":"SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography"},{"journal-title":"The ns-3 network simulator","year":"0","key":"ref18"},{"key":"ref19","article-title":"Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses","author":"montenegro","year":"2002","journal-title":"Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS 2002)"},{"article-title":"An Identity -Based Security Architecture for Wireless Mesh Network","year":"2010","author":"guangsong","key":"ref4"},{"key":"ref3","article-title":"Threats an Vulnerabilities in Wireless Mesh Network","volume":"2","author":"aswal","year":"2009","journal-title":"International Journal of Recent Trends in Engineering"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10649-1_6"},{"key":"ref5","article-title":"IEEE 802.11s wireless mesh networks: Framework and challenges","author":"wang a*","year":"2007","journal-title":"a Kiyon Inc San Diego CA 92121 United States National Institute of Information and Communication Technology"},{"key":"ref8","first-page":"213","article-title":"Identify-based Encryption from The Weil Pairing","author":"boneh","year":"2001","journal-title":"Proc of CRYPTO'01"},{"key":"ref7","first-page":"47","article-title":"Identity-based Cryptosystems and Signature Schemes","author":"shamir","year":"1984","journal-title":"Proc CRYPTO 84"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.12.001"},{"journal-title":"Draft STANDARD for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications","article-title":"IEEE 802.11s","year":"2007","key":"ref1"},{"key":"ref9","article-title":"Topics in Cryptology CT-RSA 2010","author":"josef","year":"2010","journal-title":"The Crytographers&#x2019; Track at the RSA Conference 2010"},{"key":"ref20","first-page":"56","article-title":"Efficient Authentication and Signing of Multicast Streams over Lossy Channels","author":"adrian","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"},{"journal-title":"Multiprecision Integer and Rational Arithmetic C\/C++ Library (MIRACL)","year":"2003","author":"scott","key":"ref21"}],"event":{"name":"ICC 2011 - 2011 IEEE International Conference on Communications","start":{"date-parts":[[2011,6,5]]},"location":"Kyoto, Japan","end":{"date-parts":[[2011,6,9]]}},"container-title":["2011 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5962386\/5962409\/05962921.pdf?arnumber=5962921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:55:27Z","timestamp":1490082927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5962921\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2011.5962921","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}