{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:05:26Z","timestamp":1771700726047,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/mass.2010.5663906","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T20:29:26Z","timestamp":1292358566000},"page":"525-530","source":"Crossref","is-referenced-by-count":6,"title":["A modular security architecture for managing security associations in MANETs"],"prefix":"10.1109","author":[{"given":"Mazda","family":"Salmanian","sequence":"first","affiliation":[]},{"given":"Peter C.","family":"Mason","sequence":"additional","affiliation":[]},{"given":"Joanne","family":"Treurniet","sequence":"additional","affiliation":[]},{"given":"Jiangxin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Li","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-540-74481-8_15","article-title":"Agent Methods for Network Intrusion Detection and Response","volume":"4659","author":"reh\u00e1k","year":"2007","journal-title":"Lecture Notes in Computer Science (LNCS)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref12","article-title":"NS Simulator for Beginners","author":"altman","year":"2003","journal-title":"Lecture Notes Univ de Los Andes"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(07)60034-X"},{"key":"ref14","article-title":"A Quantitative Study of Authentication Networks","author":"liang","year":"2005","journal-title":"IEEE INFOCOM"},{"key":"ref15","article-title":"Microwave Mobile Communications","author":"jakes","year":"1974"},{"key":"ref4","article-title":"Examining Trust, Forgiveness and Regret as Computational Concepts","author":"marsh","year":"2008","journal-title":"National Research Council of Canada NRC 49906"},{"key":"ref3","author":"clausen","year":"2003","journal-title":"RFC3626 Optimized link state routing protocol (OLSR)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.180"},{"key":"ref8","article-title":"Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks","author":"hoeper","year":"2006","journal-title":"Proc 5th Int Conf on AD-HOC Networks & Wireless"},{"key":"ref7","article-title":"Self-securing Ad Hoc Wireless Networks","author":"luo","year":"2002","journal-title":"7th IEEE Symp an Computers and Communications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.340"},{"key":"ref1","article-title":"IPv6 Networks","author":"gonclaves","year":"1998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4455010"}],"event":{"name":"2010 IEEE 7th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)","location":"San Francisco, CA, USA","start":{"date-parts":[[2010,11,8]]},"end":{"date-parts":[[2010,11,12]]}},"container-title":["The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5648202\/5663775\/05663906.pdf?arnumber=5663906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T17:14:47Z","timestamp":1497892487000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5663906\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/mass.2010.5663906","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}