{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:07:39Z","timestamp":1729634859663,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/wiopt.2008.4586096","type":"proceedings-article","created":{"date-parts":[[2008,8,6]],"date-time":"2008-08-06T16:13:51Z","timestamp":1218039231000},"page":"384-393","source":"Crossref","is-referenced-by-count":0,"title":["New algorithms for the efficient design of topology-oriented Key Agreement protocols in multi-hop ad hoc networks"],"prefix":"10.1109","author":[{"given":"Maria","family":"Striki","sequence":"first","affiliation":[]},{"given":"John S.","family":"Baras","sequence":"additional","affiliation":[]},{"given":"Kyriakos","family":"Manousakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/586115.586117"},{"key":"18","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/SECPRI.2003.1199337","article-title":"random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proc 2003 IEEE Symposium on Security and Privacy"},{"key":"15","first-page":"251","article-title":"providing robust and ubiquitous security support for wireless ad-hoc networks","author":"kong","year":"0","journal-title":"Proc 2001 IEEE Int'l Conf on Network Protocols (ICNP 2001)"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/TMC.2003.1195151"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/TPDS.2004.1278104"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/65.806983"},{"key":"11","first-page":"578","article-title":"round efficiency of multi-party computation with a dishonest majority","volume":"3152","author":"katz","year":"0","journal-title":"LNCS"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ICDSC.2001.918970"},{"key":"21","first-page":"45","article-title":"gkmpan: an efficient group rekeying scheme for secure multicast in ad-hoc networks","author":"zhu","year":"2004","journal-title":"IEEE Computer Society MobiQuitous"},{"key":"20","first-page":"201","article-title":"energy-aware secure multicast comm\/tion in ad-hoc networks using geographic location information","author":"lazos","year":"2003","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Proces (ICASSP'03)"},{"key":"22","article-title":"efficient scalable key agreement protocols for secure multicast communication in manets","author":"striki","year":"2003","journal-title":"Collaborative Technologies Alliance (CTA) Symposium"},{"key":"23","first-page":"39","article-title":"modeling key agreement protocols in multi-hop ad hoc networks","author":"striki","year":"2006","journal-title":"Proc 2006 Int'l Wireless Communications and Mobile Computing Conference (IWCMC)"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1145\/357195.357200"},{"key":"25","article-title":"introduction to algorithms","author":"cormen","year":"1990","journal-title":"MIT 2Press"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/TIT.1976.1055638"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/238168.238182"},{"key":"10","first-page":"110","article-title":"scalable protocols for authenticated key exchange","volume":"2729","author":"katz","year":"0","journal-title":"LNCS"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/288090.288094"},{"key":"7","first-page":"192","article-title":"efficient collaborative key management protocols for secure autonomous group communication","author":"perrig","year":"1999","journal-title":"Int'l Workshop on Cryptographic Techniques and E-Commerce (CrypTEC"},{"year":"2001","author":"hietalahti","article-title":"key establishment in ad-hoc networks","key":"6"},{"key":"5","article-title":"a secure and efficient conference key distribution system","author":"burmester","year":"0","journal-title":"Advances in Cryptology-EUROCRYPT'94 Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/TIT.1982.1056542"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/352600.352638"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1016\/S0140-3664(00)00249-8"}],"event":{"name":"2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (WiOPT)","start":{"date-parts":[[2008,4,1]]},"location":"Berlin, Germany","end":{"date-parts":[[2008,4,3]]}},"container-title":["2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4568415\/4586016\/04586096.pdf?arnumber=4586096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T06:41:58Z","timestamp":1497768118000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4586096\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2008.4586096","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}