{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:24:26Z","timestamp":1725679466764},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/seccom.2007.4550347","type":"proceedings-article","created":{"date-parts":[[2008,6,25]],"date-time":"2008-06-25T18:08:16Z","timestamp":1214417296000},"page":"294-303","source":"Crossref","is-referenced-by-count":9,"title":["A feedback reputation mechanism to secure the optimized link state routing protocol"],"prefix":"10.1109","author":[{"given":"Joao P.","family":"Vilela","sequence":"first","affiliation":[]},{"given":"Joao","family":"Barros","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"journal-title":"UM-OLSR","year":"0","author":"ros","key":"ref15"},{"journal-title":"CSS-OLSR - Code for simulations","year":"0","author":"vilela","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ANSS.2005.33"},{"key":"ref4","article-title":"Attacks against OLSR: Distributed key management for security","author":"adjih","year":"2005","journal-title":"2005 OLSR Interop and Workshop"},{"key":"ref3","article-title":"Securing the OLSR protocol","author":"adjih","year":"2003","journal-title":"Proceedings of Med-Hoc-Net"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029106"},{"key":"ref5","article-title":"Securing the OLSR routing protocol with or without compromised nodes in the network","author":"adjih","year":"2005","journal-title":"HiPER Project"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/WCNC.2004.1311268","article-title":"Implementing a fully distributed Certificate Autorithy in an OLSR MANET","author":"dhillon","year":"2004","journal-title":"Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2004)"},{"journal-title":"Optimized Link State Routing Protocol (OLSR) RFC 3626","year":"2003","author":"clausen","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2001.995315"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"}],"event":{"name":"2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","start":{"date-parts":[[2007,9,17]]},"location":"Nice, France","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543879\/4550291\/04550347.pdf?arnumber=4550347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:26:31Z","timestamp":1497777991000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550347\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/seccom.2007.4550347","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}