{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T13:06:34Z","timestamp":1746536794110,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iwcmc.2012.6314356","type":"proceedings-article","created":{"date-parts":[[2012,10,10]],"date-time":"2012-10-10T12:03:51Z","timestamp":1349870631000},"page":"1080-1084","source":"Crossref","is-referenced-by-count":5,"title":["A User-Controllable Multi-Layer Secure Algorithm for MANET"],"prefix":"10.1109","author":[{"given":"Paul Loh Ruen","family":"Chze","sequence":"first","affiliation":[]},{"given":"Wayne Kan Wai","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Kan Siew","family":"Leong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3626"},{"key":"17","first-page":"255","author":"marti","year":"2000","journal-title":"Mitigating Routing Misbehavior in Mobile Ad Hoc Networks"},{"key":"18","first-page":"1987","volume":"3","author":"zhong","year":"2003","journal-title":"Sprite A Simple Cheat-Proof Credit-Based System for Mobile Ad-Hoc Networks"},{"key":"15","first-page":"245","author":"anderegg","year":"2003","journal-title":"Ad Hoc-VCG A Truthful and Costefficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents"},{"key":"16","first-page":"245","author":"wang","year":"2004","journal-title":"Truthful Multicast Routing in Selfish Wireless Networks"},{"key":"13","first-page":"99","author":"kawadia","year":"2003","journal-title":"System Services for Ad-hoc Routing Architecture Implementation and Experiences"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-9855-1"},{"key":"11","article-title":"A survey of mobile ad hoc network attacks","volume":"2","author":"pradip","year":"2010","journal-title":"International Journal of Engineering Science"},{"journal-title":"Method and System for Secured Service-Oriented Nodes Discovery and Route Determination in Mobile Ad-hoc Network","year":"2009","author":"kan","key":"12"},{"key":"21","first-page":"6","author":"johnson","year":"2008","journal-title":"Simple Pragmatic Approach to Mesh Routing Using BATMAN"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"key":"22","first-page":"1","author":"yang","year":"2005","journal-title":"Fisheye Zone Routing Protocol for Mobile Ad Hoc Networks"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1002\/nem.603"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"journal-title":"Providing robust and ubiquitous security support for mobile ad hoc networks","year":"2001","author":"luo","key":"25"},{"key":"26","first-page":"41","author":"pirzada","year":"2004","journal-title":"Kerberos assisted authentication in mobile ad-hoc networks"},{"key":"27","first-page":"125","article-title":"A distributed light-weight authentication model for ad-hoc networks","author":"weimerskirch","year":"2002","journal-title":"Information Security and Cryptology ? ICISC 2001"},{"journal-title":"Establishing pairwise keys for secure Communication in Ad Hoc Networks A Probabilistic approach","year":"2003","author":"zhu","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1244933"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-9855-1"},{"journal-title":"A Wireless Adhoc Network Architecture for Sensor Nodes","year":"2001","author":"baydere","key":"2"},{"journal-title":"Network Architecture for Heterogeneous Mobile Ad Hoc Network","year":"2009","author":"ismail","key":"1"},{"journal-title":"Security Enhancement in MANET Authentication by Checking the CRL Status of Servers","year":"2008","author":"irshad","key":"10"},{"journal-title":"SMS4 Encryption Algorithm for Wireless Networks","year":"0","author":"diffie","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"journal-title":"Security Enhancement in MANET Authentication by Checking the CRL Status of Servers","year":"2008","author":"irshad","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.275204"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2010.5680190"},{"journal-title":"Ad Hoc Wireless Networks Protocols And Systems","year":"2001","author":"toh","key":"4"},{"key":"9","first-page":"32","author":"jetcheva","year":"2003","journal-title":"Design and Evaluation of A Metropolitan Area Multitier Wireless Ad Hoc Network Architecture"},{"key":"8","first-page":"32","author":"jetcheva","year":"2003","journal-title":"Design and Evaluation of A Metropolitan Area Multitier Wireless Ad Hoc Network Architecture"}],"event":{"name":"2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC 2012)","start":{"date-parts":[[2012,8,27]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2012,8,31]]}},"container-title":["2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6299140\/6314161\/06314356.pdf?arnumber=6314356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T18:46:09Z","timestamp":1490121969000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6314356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2012.6314356","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}