{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:26:57Z","timestamp":1729643217054,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/sahcn.2013.6644971","type":"proceedings-article","created":{"date-parts":[[2013,10,31]],"date-time":"2013-10-31T00:12:37Z","timestamp":1383178357000},"page":"131-139","source":"Crossref","is-referenced-by-count":2,"title":["Zigzag: Partial mutual revocation based trust management in tactical ad hoc networks"],"prefix":"10.1109","author":[{"given":"Xin","family":"Chen","sequence":"first","affiliation":[]},{"given":"Harshal","family":"Patankar","sequence":"additional","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Mudhakar","family":"Srivatsa","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Opper","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Detection of denialof-message attacks on sensor network broadcasts","author":"mccune","year":"2005","journal-title":"Proc S&P"},{"year":"1993","author":"white","journal-title":"Markov Decision Processes","key":"18"},{"key":"15","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proc International Conference on Mobile Computing and Networking"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ICON.2004.1409162"},{"key":"13","article-title":"Can we eliminate certificate revocation lists?","author":"rivest","year":"1998","journal-title":"Proc FC"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"11","first-page":"386","article-title":"Securing mobile ad hoc networks with certificateless public keys","volume":"3","author":"liu","year":"2006","journal-title":"IEEE TDSC"},{"key":"12","article-title":"MOCA: Mobile certificate authority for wireless ad hoc networks","author":"yi","year":"2003","journal-title":"Proc PKI"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/PTP.2003.1231515"},{"key":"2","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-540-45160-0_2","article-title":"Managing trust in peer-To-peer systems using reputation-based techniques","author":"ooi","year":"2003","journal-title":"Advances in Web-Information Management"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/502585.502638"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/948109.948141"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/1653662.1653698"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1455770.1455797"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/SAHCN.2008.26"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1151374.1151381"},{"key":"9","doi-asserted-by":"crossref","first-page":"301","DOI":"10.3233\/JCS-2006-14401","article-title":"Gkmpan: An efficient group rekeying scheme for secure multicast in ad-hoc networks","volume":"14","author":"zhu","year":"2006","journal-title":"Journal of Computer Security"},{"key":"8","article-title":"New strategies for revocation in ad-hoc networks","author":"moore","year":"2007","journal-title":"Proc ESAS"}],"event":{"name":"2013 10th Annual IEEE Communications Society Conference on Sensing and Communication in Wireless Networks (SECON)","start":{"date-parts":[[2013,6,24]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2013,6,27]]}},"container-title":["2013 IEEE International Conference on Sensing, Communications and Networking (SECON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6624146\/6644949\/06644971.pdf?arnumber=6644971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T18:40:41Z","timestamp":1564598441000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6644971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2013.6644971","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}