{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:34:59Z","timestamp":1729661699452,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/mobhoc.2007.4428672","type":"proceedings-article","created":{"date-parts":[[2008,1,14]],"date-time":"2008-01-14T18:06:39Z","timestamp":1200333999000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Trusted Application-Centric Ad-Hoc Networks"],"prefix":"10.1109","author":[{"given":"Gang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Cristian","family":"Borcea","sequence":"additional","affiliation":[]},{"given":"Liviu","family":"Iftode","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Using secure co-processors Technical report","year":"0","author":"yee","key":"ref30"},{"key":"ref10","article-title":"Establishment of ad-hoc communities through policy-based cryptog-raphy","author":"bagga","year":"2006","journal-title":"Workshop on Cryptography for Ad hoc Networks (WCAN'06)"},{"key":"ref11","article-title":"802.11 denial-of-service attacks: Real vulnerabilities and practical solutions","author":"bellardo","year":"2003","journal-title":"Proceedings of the the 8thUSENIX Security Syposium(Security'03)"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45537-X_1","article-title":"Weaknesses in the key scheduling algorithm of RC4","volume":"2259","author":"fluhrer","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1145\/352600.353052","article-title":"Implementing a distributed firewall","author":"ioannidis","year":"2000","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS'00)"},{"key":"ref15","article-title":"Establishing the genuinity of remote computer systems","author":"kennell","year":"0","journal-title":"Proceedings of USENIX Security Symposium (Security'03) 2003"},{"key":"ref16","article-title":"Providing robust and ubiquitous security support for mobile ad-hoc networks","author":"kong","year":"2001","journal-title":"the Proceedings of thethe 9th IEEE International Conference on Network Protocols(ICNP'01)"},{"key":"ref17","article-title":"Architectural support for copy and tamper resistant software","author":"lie","year":"2000","journal-title":"Architectural Support for Programming Languages and Operating Systems(ASP-LOS'00)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848455"},{"journal-title":"Microsoft Corp Next generation secure computing base","year":"0","key":"ref19"},{"key":"ref28","article-title":"Satem: A Service-aware Attestation Method Toward Trusted Service Transaction","author":"xu","year":"2006","journal-title":"Proc IEEE Symp Reliable Distributed Systems (SRDS'06)"},{"journal-title":"IEEE Standard 802 IX","article-title":"IEEE 802.1X Port-based Network Access Control","year":"2001","key":"ref4"},{"journal-title":"Trusted Computing Group &#x2013; Mobile Phone Working Group Use Case Scenarios &#x2013; v 2 7","year":"0","key":"ref27"},{"journal-title":"HostAP","year":"0","key":"ref3"},{"journal-title":"Openlx","year":"0","key":"ref6"},{"key":"ref29","article-title":"Locality driven key management for mobile ad-hoc networks","author":"xu","year":"2004","journal-title":"the Proceedings of thethe 1thIEEE International Conference on Mobile Ad-hoc Networks and Sensor Systems(MASS'04)"},{"journal-title":"Mute","year":"0","key":"ref5"},{"journal-title":"IEEE StandardEAPOL","article-title":"Extensible Authentication Protocol Over Lan","year":"2000","key":"ref8"},{"key":"ref7","article-title":"Building a high-performance, programmable secure copro-cessor","volume":"31","year":"1999","journal-title":"Comput Networks"},{"journal-title":"802 11 protocols","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354680"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1145\/1031483.1031487","article-title":"Traf-ficview: traffic data dissemination using car-to-car commu-nication","volume":"8","author":"nadeem","year":"2004","journal-title":"SIGMOBILE Mob Comput Commun Rev"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030125"},{"key":"ref21","article-title":"Ad hoc on demand Distance Vector(AODV) routing","author":"perkins","year":"1999","journal-title":"2nd IEEE Workshop on Mobile Computing Systems and Applications Applications(WMCSA '99)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"ref23","article-title":"Design and implementation of a TCG-based integrity measurement architecture","author":"sailer","year":"2004","journal-title":"Proceedings of USENIX SecuritySymposium(Security'04)"},{"journal-title":"Trusted Computing Group TCG l lb Specifications","year":"0","key":"ref26"},{"key":"ref25","article-title":"SWATT:Software-based attestation for embedded devices","author":"seshadri","year":"2004","journal-title":"Proceedings of IEEESymposiumIEEE Symposium on Security and Privacy (S & P'04)"}],"event":{"name":"2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems","start":{"date-parts":[[2007,10,8]]},"location":"Pisa, Italy","end":{"date-parts":[[2007,10,11]]}},"container-title":["2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4428591\/4428592\/04428672.pdf?arnumber=4428672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T15:18:39Z","timestamp":1588259919000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4428672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/mobhoc.2007.4428672","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}