{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:28:04Z","timestamp":1762032484512},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/mobiq.2004.1331710","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:27:50Z","timestamp":1099913270000},"page":"52-61","source":"Crossref","is-referenced-by-count":2,"title":["Composite key management for ad hoc networks"],"prefix":"10.1109","author":[{"family":"Seung Yi","sequence":"first","affiliation":[]},{"given":"R.","family":"Kravits","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Securing ad hoc networks","author":"zhou","year":"1999","journal-title":"IEEE Network Magazine"},{"journal-title":"The Official PGP User's Guide","year":"1995","author":"zimmermann","key":"16"},{"key":"13","article-title":"MOCA: Mobile certificate authority for wireless ad hoc networks","author":"yi","year":"2003","journal-title":"Proceedings of the 2nd Annual PKI Research Workshop (PK103)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939007"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317088"},{"key":"12","first-page":"79","article-title":"Building intrusion tolerant applications","author":"wu","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844108"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1986.10009"},{"key":"1","article-title":"Valuation of trust in open networks","author":"beth","year":"1994","journal-title":"Proceedings of the Conference on Computer Security"},{"journal-title":"PGP Web of Trust Statistics","year":"1998","author":"mcbumett","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/163381.163390"},{"journal-title":"Public-key infrastructure (x 509) (pkix) charter","year":"0","author":"kent","key":"6"},{"key":"5","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Proceedings of IPTPS 02 Workshop"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"9","article-title":"Attack-resistant trust metrics for public key certification","author":"levien","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"key":"8","article-title":"Providing robust and ubiquitous security support for mobile ad-hoc networks","author":"kong","year":"2001","journal-title":"Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP 2001)"}],"event":{"name":"The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004.","location":"Boston, MA, USA"},"container-title":["The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9259\/29413\/01331710.pdf?arnumber=1331710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T23:27:13Z","timestamp":1489534033000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1331710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/mobiq.2004.1331710","relation":{},"subject":[]}}