{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:29:00Z","timestamp":1730280540066,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/lcn.2011.6115561","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T19:30:31Z","timestamp":1325878231000},"page":"850-854","source":"Crossref","is-referenced-by-count":6,"title":["A light weight security scheme for HWMP protocol using Elliptic Curve technique"],"prefix":"10.1109","author":[{"given":"Jalel","family":"Ben-othman","sequence":"first","affiliation":[]},{"given":"Yesica Imelda Saavedra","family":"Benitez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962921"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"18","article-title":"Elliptic Curves and Cryptography","author":"juriscic","year":"1997","journal-title":"Dr Dobbs Journal"},{"journal-title":"Securing AODV Routing Protocol in Mobile Ad Hoc Networks","year":"2009","author":"hu phu","key":"15"},{"key":"16","first-page":"109","article-title":"Secure Routing for Wireless Mesh Networks","volume":"13","author":"li","year":"2011","journal-title":"International Journal of Security and Networks"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/941315.941317"},{"journal-title":"Federal Information Processing Standards Publication FIPS FUB 180-1","article-title":"Secure Hash Standard (SHS)","year":"2008","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2007.013791"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2008.131"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2409"},{"journal-title":"Digital Signature Standard (DSS) Category Computer Security Subcategory Cryptography","year":"2009","key":"24"},{"journal-title":"Recommended Elliptic Curves for Federal Government Use","year":"1999","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"27","article-title":"Securing ad hoc routing protocols (SAODV)","author":"manel guerrero","year":"0","journal-title":"Proceedings of the ACM Workshop on Wireless Security (WiSe 2002) September 2002"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"journal-title":"An Identity-Based Security Architecture for Wireless Mesh Network","year":"2010","author":"guangsong","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.58969"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"journal-title":"IEEE P802 11s Draft STANDARD for Information Technology- Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 10 Mesh Networking","year":"2009","key":"1"},{"key":"7","first-page":"213","article-title":"Identify based Encryption from the Weil Pairing","author":"boneh","year":"2001","journal-title":"CRYPTO'01"},{"key":"6","first-page":"47","article-title":"Identity based Cryptosystems and Signature Schemes","author":"shamir","year":"1984","journal-title":"CRYPTO'84"},{"journal-title":"SHWMP A Secure Hybrid Wireless Mesh Protocol for IEEE 802 11s Wireless Mesh Network","year":"2009","author":"islam","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"journal-title":"Multiprecision Integer and Rational Arithmetic C\/C++ Library (MIRACL)","year":"2003","author":"scott","key":"9"},{"journal-title":"The Network Simulator V 3 (Ns-3)","year":"0","key":"8"}],"event":{"name":"2011 IEEE 36th Conference on Local Computer Networks (LCN 2011)","start":{"date-parts":[[2011,10,4]]},"location":"Bonn, Germany","end":{"date-parts":[[2011,10,7]]}},"container-title":["2011 IEEE 36th Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6105664\/6114410\/06115561.pdf?arnumber=6115561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:13:08Z","timestamp":1490116388000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6115561\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/lcn.2011.6115561","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}