{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:38:53Z","timestamp":1729669133330,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscc.2003.1214145","type":"proceedings-article","created":{"date-parts":[[2004,3,30]],"date-time":"2004-03-30T17:17:26Z","timestamp":1080667046000},"page":"356-361","source":"Crossref","is-referenced-by-count":0,"title":["SERAN: a new protocol to hide an equipment in ad hoc networks"],"prefix":"10.1109","author":[{"given":"J.","family":"Ben-Othman","sequence":"first","affiliation":[]},{"family":"Xiaoyun Xue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches","author":"albers","year":"2002","journal-title":"Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"18","article-title":"Fengmin gong and chandramouli sargor. Intrusion detection for link-state routing protocols","author":"wu","year":"1997","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"journal-title":"Reposting of Proposed MANET Authentication Architecture Draft Mon","year":"1998","author":"jacobs","key":"15"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1145\/345910.345955","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proceedings of MOBICOM"},{"journal-title":"Security in Ad Hoc Networks","year":"2000","author":"vanhala","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00249-8"},{"key":"12","article-title":"The resurrecting duckling: Security issues for ad hoc wireless networks","volume":"15","author":"stajano","year":"1999","journal-title":"Proceedings of the 7th International Workshop on Security Protocols"},{"year":"1998","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1997.646178"},{"journal-title":"Ad Hoc Networks","year":"2001","author":"perkins","key":"2"},{"key":"1","volume":"20","author":"qayyum","year":"2000","journal-title":"Analysis and Evaluation of Channel Access Schemes and Routing Protocols for Wireless Networks"},{"key":"10","volume":"26","author":"ka?rpijoki","year":"2000","journal-title":"Security in Ad Hoc Networks"},{"journal-title":"Java Card Technology for Smart Cards Architecture and Programmer's Guide","year":"0","author":"chen","key":"7"},{"key":"6","volume":"17","author":"krpijoki","year":"2000","journal-title":"Signaling and Routing Security in Mobile and Adhoc Networks"},{"key":"5","volume":"2","author":"misra","year":"2000","journal-title":"Routing Protocols for Ad Hoc Mobile Wireless Networks"},{"journal-title":"Routing Security in Ad Hoc Networks","year":"2000","author":"lundberg","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2131"},{"key":"8","volume":"26","author":"wobus","year":"1998","journal-title":"DHCP FAQ"}],"event":{"name":"ISCC 2003 - International Symposium on Computers and Communications","acronym":"ISCC-03","location":"Kemer-Antalya, Turkey"},"container-title":["Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8616\/27298\/01214145.pdf?arnumber=1214145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:34:54Z","timestamp":1497573294000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1214145\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iscc.2003.1214145","relation":{},"subject":[]}}