{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:19:14Z","timestamp":1763457554761,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905187","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Prioritization of Security Measures at the Junction of MANET and IoT"],"prefix":"10.1145","author":[{"given":"Mamata","family":"Rath","sequence":"first","affiliation":[{"name":"C. V. Raman Computer Academy, Bhubaneswar Odisha"}]},{"given":"Chhabi Rani","family":"Panigrahi","sequence":"additional","affiliation":[{"name":"C. V. Raman College of Engineering, Bhubaneswar, Odisha"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34952-2_4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.03.004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2272099"},{"key":"e_1_3_2_1_5_1","unstructured":"David Airehrour Jairo A. Gutierrez \"An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT Routing\" http:\/\/www.researchgate.net\/publication\/277078202 Last accessed on - August 2015. David Airehrour Jairo A. Gutierrez \"An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT Routing\" http:\/\/www.researchgate.net\/publication\/277078202 Last accessed on - August 2015."},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"72","article-title":"A Password-Based Secure Communication Scheme in Battlefields for Internet of Things","volume":"8","author":"Hua Zhang","year":"2011","journal-title":"China Communications"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Zhijing Qin Denker G. Giannelli C. Bellavista P. Venkata subramanian N. \"A Software Defined Networking architecture for the Internet-of-Things \" in Network Operations and Management Symposium (NOMS) Pages 1--9 5-9 May 2014. Zhijing Qin Denker G. Giannelli C. Bellavista P. Venkata subramanian N. \"A Software Defined Networking architecture for the Internet-of-Things \" in Network Operations and Management Symposium (NOMS) Pages 1--9 5-9 May 2014.","DOI":"10.1109\/NOMS.2014.6838365"},{"issue":"1","key":"e_1_3_2_1_8_1","article-title":"A Mobility-Based Routing Protocol for CR Enabled Mobile Ad Hoc Networks","volume":"4","author":"Jingwen Bai Yan Sun","year":"2015","journal-title":"International Journal of Wireless Networks and Broadband Technologies (IJWNBT)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"73","DOI":"10.13189\/csit.2013.010201","article-title":"Identity Management in the Internet of Things: the Role of MANETs for Healthcare Applications","volume":"1","author":"Caroline","year":"2013","journal-title":"Computer Science and Information Technology"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2011.08.028"},{"key":"e_1_3_2_1_11_1","unstructured":"http:\/\/www.net-security.org last accessed on 15th Nov 2015. http:\/\/www.net-security.org last accessed on 15th Nov 2015."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":11,"alternative-id":["10.1145\/2905055.2905187","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905187","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}