{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:10:55Z","timestamp":1747807855350},"reference-count":24,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscc.2002.1021731","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:04:13Z","timestamp":1056564253000},"page":"567-574","source":"Crossref","is-referenced-by-count":9,"title":["Self-securing ad hoc wireless networks"],"prefix":"10.1109","author":[{"family":"Haiyun Luo","sequence":"first","affiliation":[]},{"given":"P.","family":"Zerfos","sequence":"additional","affiliation":[]},{"family":"Jiejun Kong","sequence":"additional","affiliation":[]},{"family":"Songwu Lu","sequence":"additional","affiliation":[]},{"family":"Lixia Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195405"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"year":"0","key":"23"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"ACM MOBICOM"},{"key":"24","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/978-3-540-46588-1_30","article-title":"Selecting cryptographic key sizes","author":"lenstra","year":"2000","journal-title":"Public Key Cryptography"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/236387.236439"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"14","article-title":"Proactive secret sharing","author":"herzberg","year":"1995","journal-title":"Extended Abstract"},{"key":"11","article-title":"Robust and efficient sharing of RSA functions","author":"gennaro","year":"1996","journal-title":"Journal of Cryptology"},{"journal-title":"Parallel reliable threshold multisignature","year":"1992","author":"frankel","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910004"},{"key":"3","article-title":"The PGP trust model","author":"abdul-rahman","year":"1997","journal-title":"EDI-Forum The Journal of Electronic Commerce"},{"key":"20","article-title":"Ubiquitous and robust authentication services for ad hoc wireless networks","author":"luo","year":"2000","journal-title":"UCLA Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/65.806987"},{"journal-title":"Internet X 509 Public Key Infrastructure","year":"2000","author":"aresenault","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646127"},{"journal-title":"PGP Pretty Good Privacy","year":"1995","author":"garfinkel","key":"7"},{"key":"6","article-title":"Providing robust and ubiquitous security support for MANET","author":"kong","year":"2001","journal-title":"IEEE ICNP 2001"},{"key":"5","article-title":"The Kerberos network authentication service (version 5)","author":"kohl","year":"0","journal-title":"RFC 1510"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"9","article-title":"Proactive RSA","author":"frankel","year":"1997","journal-title":"Crypto"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/49.223866"}],"event":{"name":"ISCC 2002 Seventh International Symposium on Computers and Communications","acronym":"ISCC-02","location":"Taormina-Giardini Naxos, Italy"},"container-title":["Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7956\/21983\/01021731.pdf?arnumber=1021731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:42:42Z","timestamp":1497552162000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1021731\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iscc.2002.1021731","relation":{},"subject":[]}}