{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:11Z","timestamp":1750307171202,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393226","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"52-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel approach for dynamic leader election and key based security in MANET clusters for the secured data distribution"],"prefix":"10.1145","author":[{"given":"Arifa","family":"Azeez","sequence":"first","affiliation":[{"name":"Rajagiri School of Engineering &amp; Technology, Kochi, India"}]},{"given":"K. G.","family":"Preetha","sequence":"additional","affiliation":[{"name":"Rajagiri School of Engineering &amp; Technology, Kochi, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Proceedings of seventh international conference on wireless and optical communication networks","author":"Mahakal Singh Chandee Rashid Sheikhl","year":"2010","unstructured":"Rashid Sheikhl Mahakal Singh Chandee , Durgesh Kumar Mishra3, \" Security Issues in MANET : overview \", Proceedings of seventh international conference on wireless and optical communication networks , pp 1 -- 4 , issued on September 2010 Rashid Sheikhl Mahakal Singh Chandee, Durgesh Kumar Mishra3, \"Security Issues in MANET: overview\", Proceedings of seventh international conference on wireless and optical communication networks, pp 1--4, issued on September 2010"},{"key":"e_1_3_2_1_2_1","unstructured":"2007 B. Kadri A. Mhamed M. Feham Secured Clustering Algorithm for Mobile Ad Hoc Networks International Journal of Computer Science and Network Security VOL.7 No.3 March  2007 B. Kadri A. Mhamed M. Feham Secured Clustering Algorithm for Mobile Ad Hoc Networks International Journal of Computer Science and Network Security VOL.7 No.3 March"},{"issue":"5","key":"e_1_3_2_1_3_1","article-title":"Secure multi cast Key Distribution in Mobile Ad Hoc Networks","volume":"7","author":"Devaraju Suganyadevi","year":"2010","unstructured":"Suganyadevi Devaraju , Padmavathi Ganapathi , Dynamic Clustering for QoS based Secure multi cast Key Distribution in Mobile Ad Hoc Networks , IJCSI International Journal of Computer Science Issues , Vol. 7 , Issue 5 , September 2010 Suganyadevi Devaraju, Padmavathi Ganapathi, Dynamic Clustering for QoS based Secure multi cast Key Distribution in Mobile Ad Hoc Networks, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 5, September 2010","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.22"},{"volume-title":"2010 International Conference on Computer Application and System Modeling (ICCASM 2010)","author":"Congwei Du","key":"e_1_3_2_1_6_1","unstructured":"Du Congwei , Li Rongsen and Dou Wenhua , An E_cient Key Agreement Protocol in Cluster-Based MANET , 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) Du Congwei, Li Rongsen and Dou Wenhua, An E_cient Key Agreement Protocol in Cluster-Based MANET, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010)"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 9th International Conference on Mobile and Wireless Communications Networks","author":"Kettaf Noureddine","year":"2007","unstructured":"Noureddine Kettaf , Hafdi Abouaissa , Thang Vuduong , Pascal Lorenz , A Heterogeneous Key Management Protocol for Secure Group Communications in MANET , Proceedings of the 9th International Conference on Mobile and Wireless Communications Networks , Cork, Ireland, September 19--14 J 2007 Noureddine Kettaf, Hafdi Abouaissa, Thang Vuduong, Pascal Lorenz, A Heterogeneous Key Management Protocol for Secure Group Communications in MANET, Proceedings of the 9th International Conference on Mobile and Wireless Communications Networks, Cork, Ireland, September 19--14 J 2007"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCS.2009.113"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Kashan Samad Ejaz Ahmed Waqar Mahmood Kashif Sharif Ahsan Ahmad Chaudhry Efficient Clustering Approach For Intrusion Detection In Ad Hoc Networks AusCERT2006 R and D Stream  Kashan Samad Ejaz Ahmed Waqar Mahmood Kashif Sharif Ahsan Ahmad Chaudhry Efficient Clustering Approach For Intrusion Detection In Ad Hoc Networks AusCERT2006 R and D Stream","DOI":"10.1109\/SCONEST.2005.4382879"},{"key":"e_1_3_2_1_10_1","volume-title":"ETRI Journal","volume":"27","author":"Park Chanil","year":"2005","unstructured":"Jin, Chanil Park , Daeseon Choi , Kyoil Chung , and Hyunsoo Yoon , Cluster Based Trust Evaluation Scheme in an Ad Hoc Network , ETRI Journal , Volume 27 , Number 4, August 2005 Jin, Chanil Park, Daeseon Choi, Kyoil Chung, and Hyunsoo Yoon, Cluster Based Trust Evaluation Scheme in an Ad Hoc Network, ETRI Journal, Volume 27, Number 4, August 2005"},{"key":"e_1_3_2_1_11_1","volume-title":"Security and Pseudo-Anonymity with a Cluster-based approach for MANET","author":"Rachedi Abderrezak","year":"2008","unstructured":"Abderrezak Rachedi and Abderrahim Benslimane , Security and Pseudo-Anonymity with a Cluster-based approach for MANET , 2008 publications IEEE Abderrezak Rachedi and Abderrahim Benslimane, Security and Pseudo-Anonymity with a Cluster-based approach for MANET, 2008 publications IEEE"},{"key":"e_1_3_2_1_12_1","volume-title":"International Journal of Security (IJS)","author":"Anil Kapil Dr.","year":"2006","unstructured":"Dr. Anil Kapil , Mr. Sanjeev Rana , Identity-Based Key Management in MANET using Public Key Cryptography , International Journal of Security (IJS) , Volume (3): Issue (1) 1 , 2006 Dr. Anil Kapil, Mr. Sanjeev Rana, Identity-Based Key Management in MANET using Public Key Cryptography, International Journal of Security (IJS), Volume (3): Issue (1) 1, 2006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1423333"},{"key":"e_1_3_2_1_14_1","first-page":"725","volume":"3042","author":"Bouassida M.","year":"2004","unstructured":"M. Bouassida , I. Chrisment , and O. Festor , An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks. LNCS 3042 , pp 725 -- 742 , Apr 2004 M. Bouassida, I. Chrisment, and O. Festor, An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks. LNCS 3042, pp 725--742, Apr 2004","journal-title":"LNCS"},{"key":"e_1_3_2_1_15_1","volume-title":"Frontiers of High Performance Computing and Networking ISPA 2007 Workshops LNCS 2007","volume":"2007","author":"Tsaur Woei-Jiunn","unstructured":"Woei-Jiunn Tsaur and Haw-Tyng Pai , Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks , Frontiers of High Performance Computing and Networking ISPA 2007 Workshops LNCS 2007 , Volume 4743\/ 2007 , 475--484. Woei-Jiunn Tsaur and Haw-Tyng Pai, Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks, Frontiers of High Performance Computing and Networking ISPA 2007 Workshops LNCS 2007, Volume 4743\/2007, 475--484."}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:46Z","timestamp":1750240486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":15,"alternative-id":["10.1145\/2393216.2393226","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393226","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}