{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:48:46Z","timestamp":1725680926990},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/milcom.2008.4753089","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T15:27:11Z","timestamp":1232465231000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Counteracting Byzantine adversaries with network coding: An overhead analysis"],"prefix":"10.1109","author":[{"given":"MinJi","family":"Kim","sequence":"first","affiliation":[]},{"given":"Muriel","family":"Medard","sequence":"additional","affiliation":[]},{"given":"Joao","family":"Barros","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/501416.501437"},{"key":"16","first-page":"255","article-title":"mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proceedings of the 6th annual international conference on Mobile computing and networking"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/TIFS.2008.928538"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/SAHCN.2004.1381904"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ISIT.2007.4557283"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/ISIT.2004.1365180"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.phycom.2008.01.006"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TNET.2003.818197"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/18.850663"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/CISS.2006.286587"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/TIT.2006.881746"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TIT.2002.807285"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/INFCOM.2007.78"},{"key":"4","first-page":"19","article-title":"network error correction","author":"yeung","year":"2006","journal-title":"Communications in Information and Systems"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/SECPRI.2004.1301326"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/INFOCOM.2006.233"}],"event":{"name":"MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2008,11,16]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2008,11,19]]}},"container-title":["MILCOM 2008 - 2008 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4723889\/4753027\/04753089.pdf?arnumber=4753089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:19:56Z","timestamp":1489763996000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4753089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/milcom.2008.4753089","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}