{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:40:57Z","timestamp":1729669257330,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icccn.2004.1401633","type":"proceedings-article","created":{"date-parts":[[2005,3,21]],"date-time":"2005-03-21T20:07:39Z","timestamp":1111435659000},"page":"227-232","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic key management for secure routing in LCMRMG MANET"],"prefix":"10.1109","author":[{"family":"Wuxu Peng","sequence":"first","affiliation":[]},{"family":"Yalin Wang","sequence":"additional","affiliation":[]},{"given":"K.","family":"Makki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"2","first-page":"339","article-title":"Proactive secret sharing","volume":"963","author":"herzberg","year":"1995","journal-title":"LNCS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISBI.2011.5872773"},{"key":"1","article-title":"Stimulating cooperation in self-organizing","volume":"dsc 2001 46","author":"buttyan","year":"2001","journal-title":"Mobile Ad Hoc Networks Technical Report No DSC-2001-046"},{"key":"7","article-title":"Secure routing for mobile ad hoc networks SCS communication networks and distributed systems","author":"papadimitratos","year":"2002","journal-title":"Modeling and Simulation Conference (CNDS 2002)"},{"key":"6","article-title":"Self-securing ad hoc wireless networks","author":"luo","year":"0","journal-title":"Seventh IEEE Symposium on Computers and Communications (ISCC'02)"},{"key":"5","article-title":"Providing robust and ubiquitous security support for mobile ad-hoc networks","author":"kong","year":"2001","journal-title":"Proc of IEEE 9th International Conference on Network Protocols (ICNP'01)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"9","first-page":"35","article-title":"Efficient and secure source authentication for multicast","author":"perrig","year":"2001","journal-title":"Proc of 2001 Network and Distributed System Security Symposium (NDSS '01)"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1109\/ICCCN.2003.1284175","article-title":"Locality caching multi-root multi-generation routing algorithm in mobile ad hoc networks","author":"peng","year":"2003","journal-title":"Proc of 12th International Conference on Computer Communications and Networks"},{"journal-title":"Cryptography and Network Security Principles and Practice (2nd Ed )","year":"1999","author":"stallings","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"}],"event":{"name":"13th International Conference on Computer Communications and Networks","acronym":"ICCCN-04","location":"Chicago, IL, USA"},"container-title":["Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9617\/30391\/01401633.pdf?arnumber=1401633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T17:34:41Z","timestamp":1497634481000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1401633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icccn.2004.1401633","relation":{},"subject":[]}}