{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T23:55:00Z","timestamp":1772754900639,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2003,1]]},"DOI":"10.1109\/tmc.2003.1195151","type":"journal-article","created":{"date-parts":[[2003,4,23]],"date-time":"2003-04-23T18:28:06Z","timestamp":1051122486000},"page":"52-64","source":"Crossref","is-referenced-by-count":521,"title":["Self-organized public-key management for mobile ad hoc networks"],"prefix":"10.1109","volume":"2","author":[{"given":"S.","family":"Capkun","sequence":"first","affiliation":[]},{"given":"L.","family":"Buttyan","sequence":"additional","affiliation":[]},{"given":"J.","family":"Hubaux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","volume-title":"Ad Hoc Networking","author":"Perkins","year":"2000"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WMCSA.1994.33"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/proc.1987.13702"},{"key":"ref4","article-title":"Toward a Practical Public-Key Cryptosystem","volume-title":"bachelor\u2019s thesis, Dept. Electrical Eng., Massachusetts Inst. of Technology, Cambridge","author":"Kornfelder","year":"1978"},{"key":"ref5","volume-title":"The Official PGP User\u2019s Guide","author":"Zimmermann","year":"1995"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992905"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref9","article-title":"Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses","volume-title":"Proc. Ninth Ann. Network and Distributed System Security Symp. (NDSS)","author":"Montenegro"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/505666.505668"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/35.894385"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/35.925685"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/844107.844108"},{"issue":"5","key":"ref15","doi-asserted-by":"crossref","DOI":"10.1023\/A:1025146013151","article-title":"Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks","volume":"8","author":"Buttyan","year":"2003","journal-title":"ACM\/Kluwer Mobile Networks and Applications (MONET)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/10720107_24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/0470848693"},{"key":"ref18","article-title":"Tamper ResistanceA Cautionary Note","volume-title":"Proc. Second Usenix Workshop Electronic Commerce","author":"Anderson"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/2.566159"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00249-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.2002.1017480"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1037\/e400002009-005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2307\/2786545"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1515\/9780691188331"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317088"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.72"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209243"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7755\/26880\/01195151.pdf?arnumber=1195151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T05:05:03Z","timestamp":1742101503000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1195151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,1]]}},"URL":"https:\/\/doi.org\/10.1109\/tmc.2003.1195151","relation":{},"ISSN":["1536-1233"],"issn-type":[{"value":"1536-1233","type":"print"}],"subject":[],"published":{"date-parts":[[2003,1]]}}}