{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:11Z","timestamp":1750307171764,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393237","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"120-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory"],"prefix":"10.1145","author":[{"given":"S.","family":"Geetha","sequence":"first","affiliation":[{"name":"Anna University, Tiruchirappalli"}]},{"given":"G. Geetha","family":"Ramani","sequence":"additional","affiliation":[{"name":"Anna University, Tiruchirappalli"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544809"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2007.73"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1"},{"key":"e_1_3_2_1_5_1","volume-title":"Technical report, Electrical Engineering","author":"Lehmus","year":"2000","unstructured":"M. M. Lehmus , Requirements of ad hoc network protocols , Technical report, Electrical Engineering , Helsinki University of Technology , May 2000 . M. M. Lehmus, Requirements of ad hoc network protocols, Technical report, Electrical Engineering, Helsinki University of Technology, May 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNM.2005.1544157"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.1994.380904"},{"key":"e_1_3_2_1_9_1","first-page":"238","article-title":"A distributed medium access protocol for wireless LANs","volume":"1","author":"Khayata R. E.","year":"1994","unstructured":"Khayata , R. E. , Puig , C. M. , Zweig , J. M. : ' A distributed medium access protocol for wireless LANs ', Signals Syst. Comput. , 1994 , 1 ,pp. 238 -- 242 . Khayata, R. E., Puig, C. M., Zweig, J. M.: 'A distributed medium access protocol for wireless LANs', Signals Syst. Comput., 1994, 1,pp. 238--242.","journal-title":"Signals Syst. Comput."},{"key":"e_1_3_2_1_10_1","volume-title":"Generalized Mobile Ad Hoc Network (MANET) Packet\/Message Format","author":"Clausen C.","year":"2009","unstructured":"T. Clausen , C. Dearlove , J. Dean , C. Adjih , IETF Request for Comments:5444 , Generalized Mobile Ad Hoc Network (MANET) Packet\/Message Format , February 2009 . T. Clausen, C. Dearlove, J. Dean, C. Adjih, IETF Request for Comments:5444, Generalized Mobile Ad Hoc Network (MANET) Packet\/Message Format, February 2009."},{"volume-title":"accessed","year":"2009","key":"e_1_3_2_1_11_1","unstructured":"http:\/\/www.isi.edu\/nsnam\/ns\/ , accessed September 2009 http:\/\/www.isi.edu\/nsnam\/ns\/, accessed September 2009"},{"volume-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 802.11","year":"1997","key":"e_1_3_2_1_12_1","unstructured":"802 .11 : ' Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 802.11 ', 1997 802.11: 'Wireless LAN medium access control (MAC) and physical layer (PHY) specifications 802.11', 1997"},{"key":"e_1_3_2_1_13_1","first-page":"251","volume-title":"Tanenbaum, A. S. (Ed.): 'Computer networks'","author":"Tanenbaum A. S.","year":"2002","unstructured":"Tanenbaum , A. S. : ' The medium access control sublayer ', in Tanenbaum, A. S. (Ed.): 'Computer networks' ( Prentice-Hall , 2002 , 4 th edn.), pp. 251 -- 270 . Tanenbaum, A. S.: 'The medium access control sublayer', in Tanenbaum, A. S. (Ed.): 'Computer networks' (Prentice-Hall,2002, 4th edn.), pp. 251--270.","edition":"4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on the Latest Advances in Networks (ICLAN)","author":"Cizeron S.","year":"2007","unstructured":"E. Cizeron , S. Hamma , A multiple description coding strategy for multi-path in mobile ad hoc networks , in: International Conference on the Latest Advances in Networks (ICLAN) , Paris, France , 2007 . E. Cizeron, S. Hamma, A multiple description coding strategy for multi-path in mobile ad hoc networks, in: International Conference on the Latest Advances in Networks (ICLAN), Paris, France, 2007."},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE WCNC: Wireless Communications and Networking Conference","author":"Yi E.","year":"2008","unstructured":"J. Yi , E. Cizeron , S. Hamma , B. Parrein, Simulation and performance analysis of MP-OLSR for mobile ad hoc networks , in: IEEE WCNC: Wireless Communications and Networking Conference , Las Vegas, USA , 2008 . J. Yi, E. Cizeron, S. Hamma, B. Parrein, Simulation and performance analysis of MP-OLSR for mobile ad hoc networks, in: IEEE WCNC: Wireless Communications and Networking Conference, Las Vegas, USA, 2008."},{"issue":"1","key":"e_1_3_2_1_17_1","article-title":"R, \"Multipath Fault Tolerant Routing Protocol in MANET","volume":"2","author":"Jayalakshmi V, Dr","year":"2012","unstructured":"Jayalakshmi V, Dr . Rameshkumar . R, \"Multipath Fault Tolerant Routing Protocol in MANET \", International Journal of Adhoc Networkig Systems , Vol. 2 , No. 1 2012 . Jayalakshmi V, Dr. Rameshkumar. R, \"Multipath Fault Tolerant Routing Protocol in MANET\", International Journal of Adhoc Networkig Systems, Vol.2, No.1 2012.","journal-title":"International Journal of Adhoc Networkig Systems"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393237","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:46Z","timestamp":1750240486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":17,"alternative-id":["10.1145\/2393216.2393237","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393237","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}