{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:56:49Z","timestamp":1729630609731,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wimob.2006.1696359","type":"proceedings-article","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T17:01:13Z","timestamp":1158944473000},"page":"17-23","source":"Crossref","is-referenced-by-count":2,"title":["Multipath Routing Based Secure Data Transmission in Ad Hoc Networks"],"prefix":"10.1109","author":[{"family":"Li Zhao","sequence":"first","affiliation":[]},{"given":"J.G.","family":"Delgado-Frias","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"13","first-page":"99","article-title":"Performance study of a multi-path routing method for wireless mobile ad hoc networks","author":"wu","year":"2001","journal-title":"Proc IEEE MASCOTS 01"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.1998.685281"},{"year":"0","key":"11"},{"key":"12","first-page":"3","article-title":"On the impact of alternate path routing for load balancing in mobile ad hoc networks","author":"pearlman","year":"2001","journal-title":"Proc ACMMobiHoc 2001"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2002.1043095"},{"key":"2","article-title":"The dynamic source routing protocol for mobile ad hoc networks, http:\/\/www.ietf.org\/internet- drafts\/draft-ietf-manet-dsr-04.txt, Nov. 2000, IETF","author":"broch","year":"0","journal-title":"Internet draft"},{"key":"1","first-page":"2137","article-title":"TWOACK: Preventing selfish in mobile ad hoc networks","volume":"4","author":"balakrishnan","year":"2005","journal-title":"Proc WCNC'05"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941318"},{"key":"7","doi-asserted-by":"crossref","first-page":"2404","DOI":"10.1109\/INFCOM.2004.1354662","article-title":"SPREAD: Enhancing data confidentiality in mobile ad hoc networks","volume":"4","author":"lou","year":"2004","journal-title":"Proc IEEE Infocom 2004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937262"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"4","first-page":"1976","article-title":"Packet leashes: A defense against wormhole attacks in wireless ad hoc networks","author":"hu","year":"2003","journal-title":"Proc IEEE INFOCOM 03"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"8","first-page":"255","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proc MobiCom 2000 ACM"}],"event":{"name":"IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2006. (WiMob'2006)","location":"Montr\u0089al, Qu\u0089bec, Canada"},"container-title":["IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2006. (WiMob'2006)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11150\/35739\/01696359.pdf?arnumber=1696359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T09:30:53Z","timestamp":1497691853000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1696359\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wimob.2006.1696359","relation":{},"subject":[]}}