{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:43:06Z","timestamp":1742395386191},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/vetecf.2004.1400216","type":"proceedings-article","created":{"date-parts":[[2005,4,12]],"date-time":"2005-04-12T14:25:58Z","timestamp":1113315958000},"page":"1218-1222","source":"Crossref","is-referenced-by-count":5,"title":["Stealth attacks in vehicular technologies"],"prefix":"10.1109","volume":"2","author":[{"given":"M.","family":"Jakobsson","sequence":"first","affiliation":[]},{"family":"XiaoFeng Wang","sequence":"additional","affiliation":[]},{"given":"S.","family":"Wetzel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Untraceable Email Cluster Bombs On Agent-Based Distributed Denial of Service","year":"2003","author":"jakobsson","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1285396"},{"journal-title":"Signalling and routing security in mobile and ad-hoc networks","year":"2000","author":"karpijoki","key":"ref12"},{"journal-title":"Routing Security in Ad Hoc Networks","year":"2000","author":"lundberg","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/65.967595"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"journal-title":"The TESLA Broadcast Authentication Protocol RSA CryptoBytes","year":"2002","author":"perrig","key":"ref16"},{"key":"ref17","article-title":"The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks","author":"stajano","year":"1999","journal-title":"Proc Security Protocols Workshop"},{"key":"ref18","article-title":"Defending Against Denial-of-Service Attacks with Puzzle Auctions","author":"wang","year":"2003","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"journal-title":"Securing Ad Hoc Networks","year":"1999","author":"zhou","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778422"},{"key":"ref6","article-title":"Assessing the Risk of Battery Draining in Ad Hoc Networks","author":"de boysson","year":"2004","journal-title":"preparation"},{"journal-title":"Almost Optimal Hash Sequence Traversal Financial Cryptography '02","year":"0","author":"coppersmith","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352889"},{"key":"ref7","article-title":"Using Client Puzzles to Protect TLS","author":"dean","year":"2001","journal-title":"Proceedings of the 10th USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"journal-title":"The dynamic source routing protocol for mobile ad hoc networks","year":"1999","author":"broch","key":"ref1"},{"year":"2004","key":"ref9"}],"event":{"name":"IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004","location":"Los Angeles, CA, USA"},"container-title":["IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9623\/30411\/01400216.pdf?arnumber=1400216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T03:52:30Z","timestamp":1489549950000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1400216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/vetecf.2004.1400216","relation":{},"subject":[]}}