{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:03Z","timestamp":1750308783347,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,26]],"date-time":"2010-02-26T00:00:00Z","timestamp":1267142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,26]]},"DOI":"10.1145\/1741906.1741925","type":"proceedings-article","created":{"date-parts":[[2010,3,30]],"date-time":"2010-03-30T12:32:28Z","timestamp":1269952348000},"page":"109-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes"],"prefix":"10.1145","author":[{"family":"Poonam","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Roorkee, India"}]},{"given":"K.","family":"Garg","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Roorkee, India"}]},{"given":"M.","family":"Misra","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Roorkee, India"}]}],"member":"320","published-online":{"date-parts":[[2010,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of Fifth International Conference on Availability, Reliability and Security (ARES), (Poland","author":"Poonam","year":"2010","unstructured":"Poonam , Garg, K., and Misra , M . 2010. Trust based multi path DSR protocol . In Proceedings of Fifth International Conference on Availability, Reliability and Security (ARES), (Poland , February , 2010 ). Poonam, Garg, K., and Misra, M. 2010. Trust based multi path DSR protocol. In Proceedings of Fifth International Conference on Availability, Reliability and Security (ARES), (Poland, February, 2010)."},{"key":"e_1_3_2_1_2_1","unstructured":"Johnson D. B. Maltz D. A. Hu Y. C. and Jetcheva J. G. 2003. The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETF RFC 3561 http:\/\/www.ietf.org\/rfc\/rfc3561.txt.  Johnson D. B. Maltz D. A. Hu Y. C. and Jetcheva J. G. 2003. The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft IETF RFC 3561 http:\/\/www.ietf.org\/rfc\/rfc3561.txt."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWWAN.2004.1525541"},{"key":"e_1_3_2_1_5_1","volume-title":"IEEE International Conference Networks","author":"Pirzada A. A.","year":"2004","unstructured":"Pirzada , A. A. , Datta , A. and McDonald , C. 2004 . Trust-based routing for ad-hoc wireless networks. In Proceeding of . IEEE International Conference Networks ( Singapore , 2004). 326--330. Pirzada, A. A., Datta, A. and McDonald, C. 2004. Trust-based routing for ad-hoc wireless networks. In Proceeding of. IEEE International Conference Networks (Singapore, 2004). 326--330."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11590354_115"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.36"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_3_2_1_9_1","unstructured":"Garfinkel S. 1995 PGP: Pretty Good Privacy. O'Reilly and Associates.   Garfinkel S. 1995 PGP: Pretty Good Privacy. O'Reilly and Associates."},{"key":"e_1_3_2_1_10_1","volume-title":"Trusted Dynamic Source Routing Protocol. IEEE International Conference on Wireless Communications, Networking and Mobile Computing, (WiCom","author":"Yong C.","year":"2007","unstructured":"Yong , C. , Chuanhe , H. and Wenming , S . 2007 . Trusted Dynamic Source Routing Protocol. IEEE International Conference on Wireless Communications, Networking and Mobile Computing, (WiCom 2007 ), 1632--1636. Yong, C., Chuanhe, H. and Wenming, S. 2007. Trusted Dynamic Source Routing Protocol. IEEE International Conference on Wireless Communications, Networking and Mobile Computing, (WiCom 2007), 1632--1636."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.021"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Haniotakis T. Tragoudas S. and Kalapodas C. 2004. Security enhancement through multiple path transmission in ad hoc networks. IEEE Communications Society 4187--4191.  Haniotakis T. Tragoudas S. and Kalapodas C. 2004. Security enhancement through multiple path transmission in ad hoc networks. IEEE Communications Society 4187--4191.","DOI":"10.1109\/ICC.2004.1313337"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"e_1_3_2_1_14_1","unstructured":"QUALNET simulator Available from: &lt;http:\/\/www.scalable-networks.com&gt;.  QUALNET simulator Available from: &lt;http:\/\/www.scalable-networks.com&gt;."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"}],"event":{"name":"ICWET '10: International Conference and Workshop on Emerging Trends in Technology","sponsor":["UNITECH Unitech Engineers, India","AICTE All India Council for Technical Education","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Mumbai Maharashtra India","acronym":"ICWET '10"},"container-title":["Proceedings of the International Conference and Workshop on Emerging Trends in Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1741906.1741925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:44Z","timestamp":1750278164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,26]]},"references-count":15,"alternative-id":["10.1145\/1741906.1741925","10.1145\/1741906"],"URL":"https:\/\/doi.org\/10.1145\/1741906.1741925","relation":{},"subject":[],"published":{"date-parts":[[2010,2,26]]},"assertion":[{"value":"2010-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}