{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:35:47Z","timestamp":1742394947560,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,28]]},"DOI":"10.1145\/1161289.1161302","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T18:04:00Z","timestamp":1161194640000},"page":"55-64","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Modeling Ad-hoc rushing attack in a negligibility-based security framework"],"prefix":"10.1145","author":[{"given":"Jiejun","family":"Kong","sequence":"first","affiliation":[{"name":"Scalable Network Technologies, Inc., Los Angeles, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoyan","family":"Hong","sequence":"additional","affiliation":[{"name":"University of Alabama, Tuscaloosa, AL"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mario","family":"Gerla","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2006,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023741"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_10"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"key":"e_1_3_2_1_4_1","first-page":"41","volume-title":"The Spatial Node Distribution of the Random Waypoint Mobility Model. In German Workshop on Mobile Ad Hoc Networks (WMAN)","author":"Bettstetter C.","year":"2002","unstructured":"C. Bettstetter and C. Wagner . The Spatial Node Distribution of the Random Waypoint Mobility Model. In German Workshop on Mobile Ad Hoc Networks (WMAN) , pages 41 -- 58 , 2002 . C. Bettstetter and C. Wagner. The Spatial Node Distribution of the Random Waypoint Mobility Model. In German Workshop on Mobile Ad Hoc Networks (WMAN), pages 41--58, 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"S.\n      Brands\n     and \n      D.\n      Chaum\n  . \n  Distance-Bounding Protocols (Extended Abstract)\n  . In T. Helleseth editor EUROCRYPT\n  '93 Lecture Notes in Computer Science 765 pages \n  344\n  --\n  359 1993\n  .   S. Brands and D. Chaum. Distance-Bounding Protocols (Extended Abstract). In T. Helleseth editor EUROCRYPT'93 Lecture Notes in Computer Science 765 pages 344--359 1993.","DOI":"10.1007\/3-540-48285-7_30"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"e_1_3_2_1_7_1","volume-title":"Statistics for Spatial Data","author":"Cressie N.","year":"1993","unstructured":"N. Cressie . Statistics for Spatial Data . John Wiley and Sons , 1993 . N. Cressie. Statistics for Spatial Data. John Wiley and Sons, 1993."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941317"},{"key":"e_1_3_2_1_12_1","volume-title":"ACM SIGCOMM Asia Workshop","author":"Hu Y.-C.","year":"2005","unstructured":"Y.-C. Hu and H. J. Wang . A Framework for Location Privacy in Wireless Networks . In ACM SIGCOMM Asia Workshop , 2005 . Y.-C. Hu and H. J. Wang. A Framework for Location Privacy in Wireless Networks. In ACM SIGCOMM Asia Workshop, 2005."},{"key":"e_1_3_2_1_13_1","first-page":"153","volume":"353","author":"Johnson D. B.","year":"1996","unstructured":"D. B. Johnson and D. A. Maltz . Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. Korth, editors, Mobile Computing , volume 353 , pages 153 -- 181 . Kluwer Academic Publishers, 1996 . D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. Korth, editors, Mobile Computing, volume 353, pages 153--181. Kluwer Academic Publishers, 1996.","journal-title":"Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. Korth, editors, Mobile Computing"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778449"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062722"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102237"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/876907.881590"},{"key":"e_1_3_2_1_20_1","volume-title":"Secure Routing for Mobile Ad Hoc Networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)","author":"Papadimitratos P.","year":"2002","unstructured":"P. Papadimitratos and Z. J. Haas . Secure Routing for Mobile Ad Hoc Networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002) , 2002 . P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad Hoc Networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941318"},{"key":"e_1_3_2_1_22_1","first-page":"90","volume-title":"Ad-Hoc On-Demand Distance Vector Routing. In IEEE WMCSA '99","author":"Perkins C. E.","year":"1999","unstructured":"C. E. Perkins and E. M. Royer . Ad-Hoc On-Demand Distance Vector Routing. In IEEE WMCSA '99 , pages 90 -- 100 , 1999 . C. E. Perkins and E. M. Royer. Ad-Hoc On-Demand Distance Vector Routing. In IEEE WMCSA '99, pages 90--100, 1999."},{"issue":"2","key":"e_1_3_2_1_23_1","first-page":"2","volume":"5","author":"Perrig A.","year":"2002","unstructured":"A. Perrig , R. Canetti , D. Tygar , and D. Song . The TESLA Broadcast Authentication Protocol. RSA CryptoBytes , 5 ( 2 ): 2 -- 13 , 2002 . A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5(2):2--13, 2002.","journal-title":"The TESLA Broadcast Authentication Protocol. RSA CryptoBytes"},{"key":"e_1_3_2_1_24_1","volume-title":"Med-Hoc-Net","author":"Sambasivam P.","year":"2004","unstructured":"P. Sambasivam , A. Murthy , and E. M. Belding-Royer . Dynamically Adaptive Multipath Routing based on AODV . In Med-Hoc-Net , 2004 . P. Sambasivam, A. Murthy, and E. M. Belding-Royer. Dynamically Adaptive Multipath Routing based on AODV. In Med-Hoc-Net, 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/645532.656326"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.10.004"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"}],"event":{"name":"DIWANS06: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks 2006","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Los Angeles California","acronym":"DIWANS06"},"container-title":["Proceedings of the 5th ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161289.1161302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T14:16:14Z","timestamp":1673187374000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161289.1161302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,28]]},"references-count":25,"alternative-id":["10.1145\/1161289.1161302","10.1145\/1161289"],"URL":"https:\/\/doi.org\/10.1145\/1161289.1161302","relation":{},"subject":[],"published":{"date-parts":[[2006,9,28]]},"assertion":[{"value":"2006-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}