{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:48Z","timestamp":1750308528345,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905351","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Content Dissemination in Small Topological Environment by Enhancing Security of DSR"],"prefix":"10.1145","author":[{"given":"Naman","family":"Vaishnav","sequence":"first","affiliation":[{"name":"GTU PG School, Ahmedabad, India"}]},{"given":"Hardik","family":"Upadhyay","sequence":"additional","affiliation":[{"name":"GPERI, Mehsana, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2014 International Conference on. IEEE","author":"Echchaachoui Adel","year":"2014","unstructured":"Echchaachoui , Adel , et al. \" Asymmetric and dynamic encryption for routing security in MANETs.\" Multimedia Computing and Systems (ICMCS) , 2014 International Conference on. IEEE , 2014 . Echchaachoui, Adel, et al. \"Asymmetric and dynamic encryption for routing security in MANETs.\" Multimedia Computing and Systems (ICMCS), 2014 International Conference on. IEEE, 2014."},{"key":"e_1_3_2_1_2_1","volume-title":"S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li\" Efficient HMAC-based secure communication for VANETs\", Article","author":"Changhui Hu","year":"2012","unstructured":"Changhui Hu , Tat Wing Chim , S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li\" Efficient HMAC-based secure communication for VANETs\", Article -11 April 2012 Changhui Hu, Tat Wing Chim, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li\" Efficient HMAC-based secure communication for VANETs\", Article -11 April 2012"},{"volume-title":"Robert John D'Souza, and Golla Varaprasad,\" Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks\", 1530-437X","year":"2012","key":"e_1_3_2_1_3_1","unstructured":"Shiva Murthy G , Robert John D'Souza, and Golla Varaprasad,\" Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks\", 1530-437X , IEEE 2012 Shiva Murthy G, Robert John D'Souza, and Golla Varaprasad,\" Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks\", 1530-437X, IEEE 2012"},{"key":"e_1_3_2_1_4_1","volume-title":"Debasish Jena, Maode Ma, \"A novel authenticated encryption scheme with convertibility\", Article","author":"Sandeep Thadvai","year":"2012","unstructured":"Sandeep Thadvai , Deep Narayan Tiwari , Debasish Jena, Maode Ma, \"A novel authenticated encryption scheme with convertibility\", Article -17 July 2012 Sandeep Thadvai, Deep Narayan Tiwari, Debasish Jena, Maode Ma, \"A novel authenticated encryption scheme with convertibility\", Article -17 July 2012"},{"key":"e_1_3_2_1_5_1","volume-title":"Muhammad Nazrul Islam, M Mofazzal ossain, \"Performance Evaluation of Symmetric Encryption Algorithm in MANET and WLAN\", 10.1109\/TECHPOS.2009.5412055","author":"Matin Md.","year":"2009","unstructured":"M A Matin , Md. Monir Hossain , Md Foizul Islam , Muhammad Nazrul Islam, M Mofazzal ossain, \"Performance Evaluation of Symmetric Encryption Algorithm in MANET and WLAN\", 10.1109\/TECHPOS.2009.5412055 , IEEE 2009 M A Matin, Md. Monir Hossain, Md Foizul Islam, Muhammad Nazrul Islam, M Mofazzal ossain, \"Performance Evaluation of Symmetric Encryption Algorithm in MANET and WLAN\", 10.1109\/TECHPOS.2009.5412055, IEEE 2009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00201"},{"key":"e_1_3_2_1_7_1","volume-title":"2012 Fourth International Conference on. IEEE","author":"Sadeghi Mohammad","year":"2012","unstructured":"Sadeghi , Mohammad , and Saadiah Yahya . \"Analysis of Wormhole attack on MANETs using different MANET routing protocols.\" Ubiquitous and Future Networks (ICUFN) , 2012 Fourth International Conference on. IEEE , 2012 . Sadeghi, Mohammad, and Saadiah Yahya. \"Analysis of Wormhole attack on MANETs using different MANET routing protocols.\" Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on. IEEE, 2012."},{"issue":"9","key":"e_1_3_2_1_8_1","first-page":"4063","article-title":"A survey of mobile ad hoc network attacks","volume":"2","author":"Jawandhiya Pradip M","year":"2010","unstructured":"Jawandhiya , Pradip M . , et al. \" A survey of mobile ad hoc network attacks .\" International Journal of Engineering Science and Technology 2 . 9 ( 2010 ): 4063 -- 4071 . Jawandhiya, Pradip M., et al. \"A survey of mobile ad hoc network attacks.\"International Journal of Engineering Science and Technology 2.9 (2010): 4063--4071.","journal-title":"International Journal of Engineering Science and Technology"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085371"},{"key":"e_1_3_2_1_10_1","volume-title":"2006 International Symposium on. IEEE","author":"Kannhavong Bounpadith","year":"2006","unstructured":"Kannhavong , Bounpadith , et al. \" Analysis of the node isolation attack against OLSR-based mobile ad hoc networks.\" Computer Networks , 2006 International Symposium on. IEEE , 2006 . Kannhavong, Bounpadith, et al. \"Analysis of the node isolation attack against OLSR-based mobile ad hoc networks.\" Computer Networks, 2006 International Symposium on. IEEE, 2006."},{"key":"e_1_3_2_1_11_1","unstructured":"Agrawal Sudhir Sanjeev Jain and Sanjeev Sharma. \"A survey of routing attacks and security measures in mobile adhoc networks.\" arXiv preprint arXiv:1105.5623 (2011).  Agrawal Sudhir Sanjeev Jain and Sanjeev Sharma. \"A survey of routing attacks and security measures in mobile adhoc networks.\" arXiv preprint arXiv:1105.5623 (2011)."},{"key":"e_1_3_2_1_12_1","volume-title":"2013 International Conference on. IEEE","author":"Usha G.","year":"2013","unstructured":"Usha , G. , and Sayan Bose . \"Impact of Gray hole attack on adhoc networks.\" Information Communication and Embedded Systems (ICICES) , 2013 International Conference on. IEEE , 2013 . Usha, G., and Sayan Bose. \"Impact of Gray hole attack on adhoc networks.\" Information Communication and Embedded Systems (ICICES), 2013 International Conference on. IEEE, 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"e_1_3_2_1_14_1","volume-title":"3rd International Conference on. IET","author":"Venkanna U.","year":"2011","unstructured":"Venkanna , U. , and R. Leela Velusamy . \" Black hole attack and their counter measure based on trust management in manet: A survey.\" Advances in Recent Technologies in Communication and Computing (ARTCom 2011) , 3rd International Conference on. IET , 2011 . Venkanna, U., and R. Leela Velusamy. \"Black hole attack and their counter measure based on trust management in manet: A survey.\" Advances in Recent Technologies in Communication and Computing (ARTCom 2011), 3rd International Conference on. IET, 2011."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905351","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:55:49Z","timestamp":1750272949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":14,"alternative-id":["10.1145\/2905055.2905351","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905351","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}