{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:32:44Z","timestamp":1729675964403,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/mobhoc.2007.4428765","type":"proceedings-article","created":{"date-parts":[[2008,1,14]],"date-time":"2008-01-14T18:06:39Z","timestamp":1200333999000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Gergely","family":"Acs","sequence":"first","affiliation":[]},{"given":"Levente","family":"Buttyan","sequence":"additional","affiliation":[]},{"given":"Istvan","family":"Vajda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/3-540-36978-3_23","article-title":"A performance evaluation of intrusion-tolerant routing in wireless sensor networks","author":"deng","year":"2003","journal-title":"IEEE Workshop on Information Processing in Sensor Networks (IPSN)"},{"key":"ref3","article-title":"INSENS: Intrusion-Tolerant Routing in Wireless Sensor Sensor Networks","author":"deng","year":"2002","journal-title":"Technical Report CU-CS-939-02"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180351"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161302"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2006.4374344"},{"journal-title":"An analysis of the secure routing protocol for mobile ad hoc network route discovery Using intuitive reasoning and formal verification to identify flaws","year":"2003","author":"marshall","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2006.170","article-title":"Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks","volume":"5","author":"\u00e1cs","year":"2006","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986861"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1145\/1180345.1180352","article-title":"Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks","author":"\u00e1cs","year":"2006","journal-title":"Proceedings of ACM SASN"}],"event":{"name":"2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems","start":{"date-parts":[[2007,10,8]]},"location":"Pisa, Italy","end":{"date-parts":[[2007,10,11]]}},"container-title":["2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4428591\/4428592\/04428765.pdf?arnumber=4428765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T23:00:47Z","timestamp":1497740447000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4428765\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/mobhoc.2007.4428765","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}