{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T21:06:11Z","timestamp":1764363971930},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/icves.2008.4640905","type":"proceedings-article","created":{"date-parts":[[2008,10,14]],"date-time":"2008-10-14T15:17:20Z","timestamp":1223997440000},"source":"Crossref","is-referenced-by-count":27,"title":["Securing location aware services over VANET using geographical secure path routing"],"prefix":"10.1109","author":[{"given":"Vivek","family":"Pathak","sequence":"first","affiliation":[]},{"given":"Danfeng","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Liviu","family":"Iftode","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.50"},{"key":"22","first-page":"231","article-title":"sustaining cooperation in multi-hop wireless networks","author":"mahajan","year":"2005","journal-title":"Proceedings of 2nd Symposium on Networked Systems Design and Implementation"},{"key":"17","article-title":"survey on location privacy in pervasive computing","author":"grlach","year":"2004","journal-title":"Proceedings of The First Workshop on Security and Privacy at the Conference on Pervasive Computing (SPPC)"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440904"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"16","author":"lundberg","year":"2000","journal-title":"Routing Security in Ad Hoc Networks"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/584051.584056"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1052871.1052875"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1052871.1052875"},{"key":"21","first-page":"102","article-title":"anonymous secure routing in mobile ad-hoc networks","author":"zhu","year":"2004","journal-title":"LCN"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.21236\/ADA180187","author":"finn","year":"1987","journal-title":"Routing and addressing problems in large metropolitanscale internetworks"},{"key":"20","first-page":"300","article-title":"an anonymous on-demand position-based routing in mobile ad hoc networks","author":"rahman","year":"2006","journal-title":"SAINT"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012319418150"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071008"},{"key":"10","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/345910.345955","article-title":"mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Mobicom"},{"key":"7","first-page":"217","article-title":"geographic routing made practical","author":"kim","year":"2005","journal-title":"Proceedings of 2nd Symposium on Networked Systems Design and Implementation"},{"key":"6","author":"pathak","year":"2008","journal-title":"Securing geographical routing in mobile ad-hoc networks"},{"key":"5","year":"0","journal-title":"The Network Simulator NS-2 (v2 1b8a)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"8","author":"capkun","year":"2004","journal-title":"Secure and privacy-preserving communication in hybrid ad hoc networks"}],"event":{"name":"2008 IEEE International Conference on Vehicular Electronics and Safety (ICVES 2008)","location":"Columbus, OH","start":{"date-parts":[[2008,9,22]]},"end":{"date-parts":[[2008,9,24]]}},"container-title":["2008 IEEE International Conference on Vehicular Electronics and Safety"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4636761\/4640848\/04640905.pdf?arnumber=4640905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T12:55:05Z","timestamp":1557838505000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4640905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icves.2008.4640905","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}