{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:24:04Z","timestamp":1729653844960,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icppw.2002.1039714","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T19:34:26Z","timestamp":1056569666000},"page":"73-78","source":"Crossref","is-referenced-by-count":4,"title":["Robust routing in wireless ad hoc networks"],"prefix":"10.1109","author":[{"family":"Seungjoon Lee","sequence":"first","affiliation":[]},{"family":"Bohyung Han","sequence":"additional","affiliation":[]},{"family":"Minho Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"251","article-title":"Providing robust and ubiquitous security support for mobile ad-hoc networks","author":"kong","year":"2001","journal-title":"International Conference on Network Protocols (ICNP)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00245-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019135923695"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref14","article-title":"Secure routing for mobile ad hoc networks","volume":"13","author":"papadimitratos","year":"1999","journal-title":"IEEE Network Magazine"},{"key":"ref15","article-title":"Temporally-ordered routing algorithm (TORA)","author":"park","year":"1998","journal-title":"Internet Draft IETF"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"ref17","article-title":"Ad hoc on demand distance vector (AODV) routing","author":"perkins","year":"2001","journal-title":"Internet Draft IETF"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313538"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref4","article-title":"A secure routing protocol for ad hoc networks","volume":"13","author":"dahill","year":"1999","journal-title":"IEEE Network Magazine"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/288235.288256","article-title":"A performance comparison of multi-hop wireless ad hoc network routing protocols","author":"broch","year":"1998","journal-title":"Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking"},{"journal-title":"The VINT Project UC Berkeley LBL USC\/ISI and Xerox PARC","year":"1997","author":"fall","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050407"},{"key":"ref8","first-page":"139","article-title":"DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks","author":"johnson","year":"2001","journal-title":"In Ad Hoc Networking edited by Charles E Perkins"},{"key":"ref7","first-page":"305","article-title":"The digital distributed systems security architecture","author":"gasser","year":"1989","journal-title":"Proceedings of the 1989 National Computer Security Conference"},{"journal-title":"Data Network","year":"1992","author":"bertsekas","key":"ref2"},{"journal-title":"Wireless and Mobility Extensions to ns-2","year":"1999","key":"ref1"},{"key":"ref9","article-title":"Dass: Distributed authentication security service","author":"kaufman","year":"1993","journal-title":"Request for Comments 1507"},{"key":"ref20","article-title":"Intrusion detection in wireless ad hoc networks","author":"zhang","year":"2001","journal-title":"Proceeding of MOBICOM"},{"key":"ref21","article-title":"Securing ad hoc networks","volume":"13","author":"zhou","year":"1999","journal-title":"IEEE Network Magazine"}],"event":{"name":"International Conference on Parallel Processing Workshop","acronym":"ICPPW-02","location":"Vancouver, BC, Canada"},"container-title":["Proceedings. International Conference on Parallel Processing Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8062\/22290\/01039714.pdf?arnumber=1039714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:44:52Z","timestamp":1497552292000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1039714\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icppw.2002.1039714","relation":{},"subject":[]}}