{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:21:07Z","timestamp":1738387267815,"version":"3.35.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/wiopt.2008.4586067","type":"proceedings-article","created":{"date-parts":[[2008,8,6]],"date-time":"2008-08-06T20:13:51Z","timestamp":1218053631000},"page":"217-224","source":"Crossref","is-referenced-by-count":0,"title":["Self-organized authentication architecture for Mobile Ad-hoc Networks"],"prefix":"10.1109","author":[{"given":"P.","family":"Caballero-Gil","sequence":"first","affiliation":[]},{"given":"C.","family":"Caballero-Gil","sequence":"additional","affiliation":[]},{"given":"J.","family":"Molina-Gil","sequence":"additional","affiliation":[]},{"given":"C.","family":"Hernandez-Goya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"13","article-title":"a new authentication protocol for revocable anonymity in ad-hoc networks","author":"wierzbicki","year":"2005","journal-title":"Proceedings of the IASTED Communication Network and Information Security CNIS"},{"key":"14","doi-asserted-by":"crossref","first-page":"399","DOI":"10.3233\/FUN-2005-68406","article-title":"a secure strong-password authentication protocol","volume":"68","author":"wu","year":"2005","journal-title":"Fundamenta Informaticae"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.14"},{"journal-title":"Authentication in Ad-hoc and Sensor Networks","year":"2004","author":"weimerskirch","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44679-6_28"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2006.1696638"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089777"},{"key":"10","article-title":"robust membership management for ad-hoc groups","author":"maki","year":"2000","journal-title":"Proceedings of 5th Nordic Workshop on Secure IT Systems NORDSEC"},{"key":"7","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1007\/978-3-540-30582-8_72","article-title":"a self-organized architecture in mobile ad-hoc networks","volume":"3291","author":"hahm","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"6","first-page":"171","article-title":"how to prove all np-statements in zero-knowledge, and a methodology of cryptographic protocol design","author":"goldreich","year":"1986","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"4","first-page":"1288","article-title":"zero-knowledge hierarchical authentication in manets. ieice transactions on information and systems","volume":"e 89 d","author":"caballero-gil","year":"2006","journal-title":"Letter"},{"key":"9","article-title":"graph algebraic interpretation of trust establishment in autonomic networks","author":"jiang","year":"2005","journal-title":"Submitted to Wiley Journal of Networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"}],"event":{"name":"2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (WiOPT)","start":{"date-parts":[[2008,4,1]]},"location":"Berlin, Germany","end":{"date-parts":[[2008,4,3]]}},"container-title":["2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4568415\/4586016\/04586067.pdf?arnumber=4586067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T10:32:56Z","timestamp":1738319576000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4586067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2008.4586067","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}