{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:06:19Z","timestamp":1725458779642},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isspit.2014.7300589","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T18:19:44Z","timestamp":1445883584000},"page":"000207-000212","source":"Crossref","is-referenced-by-count":0,"title":["A secure clustering scheme for geographically routed wireless ad hoc networks"],"prefix":"10.1109","author":[{"given":"C.","family":"Tselikis","sequence":"first","affiliation":[]},{"given":"S.","family":"Mitropoulos","sequence":"additional","affiliation":[]},{"given":"C.","family":"Douligeris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"389","article-title":"Design and Demonstration of Policy-Based Management in a Multi-Hop Ad Hoc Network","author":"phanse","year":"2003","journal-title":"Journal of Ad Hoc Networks"},{"key":"ref11","article-title":"Security Issues in Group Integrity Management for Multimedia Multicasting","author":"andreas","year":"0","journal-title":"Third International Conference on Information Communications & Signal Processing (ICICS 2001) Singapore"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269716"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.10.015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288409"},{"year":"0","author":"sim","key":"ref3"},{"key":"ref6","article-title":"Towards intrusion detection in wireless sensor networks","author":"krontiris","year":"2007","journal-title":"Proceedings of the 13th European Wireless Conference"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/ACSAC.2006.46","article-title":"Secure Distributed Cluster Formation in Wireless Sensor Networks","author":"sun","year":"2006","journal-title":"Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC'06)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348124"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSSNS.2006.1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345953"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.031912.112484"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SDNE.1996.502444"}],"event":{"name":"2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","start":{"date-parts":[[2014,12,15]]},"location":"Noida, India","end":{"date-parts":[[2014,12,17]]}},"container-title":["2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7277353\/7300553\/07300589.pdf?arnumber=7300589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T20:20:19Z","timestamp":1567282819000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7300589\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isspit.2014.7300589","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}