{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:07:17Z","timestamp":1729634837157,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883585","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:10:33Z","timestamp":1409753433000},"page":"1808-1812","source":"Crossref","is-referenced-by-count":3,"title":["Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks"],"prefix":"10.1109","author":[{"given":"Yesica Imelda Saavedra","family":"Benitez","sequence":"first","affiliation":[]},{"given":"Jalel","family":"Ben-Othman","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Claude","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"22","first-page":"310","author":"hess","year":"2003","journal-title":"Efficient Identity Based Signature Schemes Based on Pairings"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.01.002"},{"journal-title":"Michael Scott MIRACL","year":"2003","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2013.6692539"},{"year":"0","key":"24"},{"key":"15","article-title":"Performance comparison between IBE-HWMP and ECDSA-HWMP","author":"saavedra benitez","year":"2012","journal-title":"Journals Production Department Security and Communication Networks"},{"journal-title":"A New Method to Secure RA-OLSR Using IBE Global Telecommunications (GLOBECOM2012)","year":"2012","author":"ben-othman","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115561"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364045"},{"key":"11","article-title":"IBC-HWMP: A novel secure identity-based cryptography-based scheme for HWMP for IEEE 802.11s","author":"ben-othman","year":"2010","journal-title":"Journal of Concurrency and Computation Practice and Experience"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6134357"},{"key":"21","first-page":"47","article-title":"Identity based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Of Crypto'1984"},{"key":"3","first-page":"70","article-title":"Fisheye state routing: A routing scheme for ad hoc wireless networks","volume":"1","author":"pei","year":"2000","journal-title":"Proceedings of IEEE ICC"},{"key":"20","first-page":"213","author":"boneh","year":"2001","journal-title":"Identify-based Encryption from the Weil Pairing Crypto01"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2001.995315"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962921"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2008.4812906"},{"key":"6","first-page":"1","author":"herberga","year":"2010","journal-title":"Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2 Internet Technology and Applications"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03819-8_25","article-title":"IEEE 802.11s wireless mesh networks: Challenges and perspectives","author":"sgora","year":"2009","journal-title":"Proceedings of the 1st International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT 2009)"},{"key":"4","first-page":"270","article-title":"Optimisation of RTS\/CTS handshake in IEEE 802.11 Wireless LANs for maximum performance","author":"chatzimisios","year":"2004","journal-title":"Proceedings of the IEEE Global Telecommunications Conference (Globecom 2004) Workshops"},{"key":"9","article-title":"Anne marie hegland, pl spilling, ivind kure and leif nilsen. Scalable revocation in hybrid ad hoc networks. The SHARL scheme","volume":"3","author":"holsve ofigsb","year":"2008","journal-title":"Journal of Networks"},{"key":"8","article-title":"Hybrid protection of OLSR","author":"hegland","year":"2006","journal-title":"Workshop on Cryptography for Ad-hoc Networks (WCAN06)"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883585.pdf?arnumber=6883585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T19:50:17Z","timestamp":1498161017000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883585","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}