{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:29:22Z","timestamp":1730280562156,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761256","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T18:14:59Z","timestamp":1394734499000},"page":"308-311","source":"Crossref","is-referenced-by-count":0,"title":["Security analysis of a protocol for pollution attack detection"],"prefix":"10.1109","author":[{"given":"Kiattikul","family":"Sooksomsatarn","sequence":"first","affiliation":[]},{"given":"Ian","family":"Welch","sequence":"additional","affiliation":[]},{"given":"Winston K. G.","family":"Seah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"198","article-title":"On the security of public key protocols,\" information theory","volume":"29","author":"dolev","year":"1983","journal-title":"IEEE Transactions on"},{"journal-title":"Formal Systems (europe) Ltd Failuresdivergence Refinement","year":"0","author":"brownlee","key":"13"},{"journal-title":"Blount MetraTech Corp Accounting Attributes and Record Formats","year":"2000","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/828.833"},{"key":"12","volume":"1","author":"roscoe","year":"1998","journal-title":"The Theory and Practice of Concurrency"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952989"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100607"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"10","first-page":"442","article-title":"Cooperative defense against pollution attacks in network coding using spacemac,\" selected areas in communications","volume":"30","year":"0","journal-title":"IEEE Journal on"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934876"},{"key":"6","first-page":"292","article-title":"Homomorphic macs: Macbased integrity for network coding","author":"agrawal","year":"2009","journal-title":"Proceedings of the 7th International Conference on Applied Cryptography and Network Security ser ACNS '09 Berlin Heidelberg Springer"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.233"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2010.5487673"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062036"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","start":{"date-parts":[[2013,10,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761256.pdf?arnumber=6761256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:24:49Z","timestamp":1490289889000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761256\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761256","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}