{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:25Z","timestamp":1750306345094,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T00:00:00Z","timestamp":1458518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,21]]},"DOI":"10.1145\/2909067.2909080","type":"proceedings-article","created":{"date-parts":[[2016,8,8]],"date-time":"2016-08-08T13:10:51Z","timestamp":1470661851000},"page":"77-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Key Management Techniques for Securing MANET"],"prefix":"10.1145","author":[{"given":"Neha","family":"Singh","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, MMM University of Technology, Gorakhpur, Uttar Pradesh, India"}]},{"given":"Saurabh","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MMM University of Technology, Gorakhpur, Uttar Pradesh, India"}]},{"given":"Naveen","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MMM University of Technology, Gorakhpur, Uttar Pradesh, India"}]},{"given":"Rakesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MMM University of Technology, Gorakhpur, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"153","volume-title":"Ad Hoc Networks","author":"Chlamtac I.","year":"2003","unstructured":"I. Chlamtac , M. Conti , and J. Liu , Mobile ad hoc networking: imperatives and challenges , Ad Hoc Networks , pp. 153 158, 2003 . I. Chlamtac, M. Conti, and J. Liu, Mobile ad hoc networking: imperatives and challenges, Ad Hoc Networks, pp. 153 158, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/S1570-8705(03)00018-0"},{"issue":"4","key":"e_1_3_2_1_3_1","first-page":"172","article-title":"A Review on Key Management Schemes in MANET","volume":"3","author":"Dalal R.","year":"2012","unstructured":"R. Dalal , Y. Singh , and M. Khari , A Review on Key Management Schemes in MANET , Int. J. Dist. Parall. Sys. , vol. 3 , no. 4 , pp. 165 172 , 2012 . R. Dalal, Y. Singh, and M. Khari, A Review on Key Management Schemes in MANET, Int. J. Dist. Parall. Sys., vol. 3, no. 4, pp. 165 172, 2012.","journal-title":"Int. J. Dist. Parall. Sys."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1504\/IJSN.2009.023431"},{"key":"e_1_3_2_1_5_1","first-page":"100","article-title":"Key distribution in mobile ad hoc networks based on message relaying","volume":"4572","author":"van der Merwe J.","year":"2007","unstructured":"J. van der Merwe , D. Dawoud , and S. McDonald , Key distribution in mobile ad hoc networks based on message relaying , Secur. Priv. Ad-hoc Sens. Networks , vol. 4572 , pp. 87 100 , 2007 . J. van der Merwe, D. Dawoud, and S. McDonald, Key distribution in mobile ad hoc networks based on message relaying, Secur. Priv. Ad-hoc Sens. Networks, vol. 4572, pp. 87 100, 2007.","journal-title":"Secur. Priv. Ad-hoc Sens. Networks"},{"key":"e_1_3_2_1_6_1","first-page":"535","article-title":"PIKE: Peer Intermediaries for Key Establishment in Sensor Networks","volume":"1","author":"Chan H.","year":"2005","unstructured":"H. Chan and A. Perrig , PIKE: Peer Intermediaries for Key Establishment in Sensor Networks , IEEE Infocom , vol. 1 , pp. 524 535 , 2005 . H. Chan and A. Perrig, PIKE: Peer Intermediaries for Key Establishment in Sensor Networks, IEEE Infocom, vol. 1, pp. 524 535, 2005.","journal-title":"IEEE Infocom"},{"key":"e_1_3_2_1_7_1","first-page":"2414","volume-title":"Twenty-third Annu. Conf. IEEE Comput. Commun. Societ INFOCOM 2004","volume":"4","author":"A.","year":"2004","unstructured":"A. C.-F. Chan, Distributed symmetric key management for mobile ad hoc networks , Twenty-third Annu. Conf. IEEE Comput. Commun. Societ INFOCOM 2004 , vol. 4 , no. C, pp. 2414 2424, 2004 . A. C.-F. Chan, Distributed symmetric key management for mobile ad hoc networks, Twenty-third Annu. Conf. IEEE Comput. Commun. Societ INFOCOM 2004, vol. 4, no. C, pp. 2414 2424, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.5555\/1025124.1025893"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1186\/1687-1499-2011-112"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Int. J. Security., no. 3","author":"Kapil A. K.","year":"2009","unstructured":"A. K. Kapil , S. K. Rana , Identity-Based Key Management in MANETs using Public Key Cryptography , Int. J. Security., no. 3 , pp. 1 8, 2009 . A. K. Kapil, S. K. Rana, Identity-Based Key Management in MANETs using Public Key Cryptography, Int. J. Security., no. 3, pp. 1 8, 2009."},{"issue":"2","key":"e_1_3_2_1_12_1","first-page":"183","article-title":"A Hybrid Schema Zone-Based Key Management","volume":"35","author":"Technology A. I.","year":"2012","unstructured":"A. I. Technology , T. Khdour , A. Aref , and S. Arabia , A Hybrid Schema Zone-Based Key Management , Int. J. Comp. Sc. , vol. 35 , no. 2 , pp. 175 183 , 2012 . A. I. Technology, T. Khdour, A. Aref, and S. Arabia, A Hybrid Schema Zone-Based Key Management, Int. J. Comp. Sc., vol. 35, no. 2, pp. 175 183, 2012.","journal-title":"Int. J. Comp. Sc."},{"issue":"7","key":"e_1_3_2_1_13_1","first-page":"42","article-title":"Kumar, Cluster based composite key management in mobile ad hoc networks","volume":"4","author":"PushpaLakshmi R.","year":"2010","unstructured":"R. PushpaLakshmi and D. A. V. A . Kumar, Cluster based composite key management in mobile ad hoc networks , Int. J. Comput. Appl. , vol. 4 , no. 7 , pp. 36 42 , 2010 . R. PushpaLakshmi and D. A. V. A. Kumar, Cluster based composite key management in mobile ad hoc networks, Int. J. Comput. Appl., vol. 4, no. 7, pp. 36 42, 2010.","journal-title":"Int. J. Comput. Appl."}],"event":{"acronym":"WIR '16","name":"WIR '16: Women in Research 2016","location":"Indore India"},"container-title":["Proceedings of the ACM Symposium on Women in Research 2016"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2909067.2909080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2909067.2909080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:55:48Z","timestamp":1750222548000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2909067.2909080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,21]]},"references-count":13,"alternative-id":["10.1145\/2909067.2909080","10.1145\/2909067"],"URL":"https:\/\/doi.org\/10.1145\/2909067.2909080","relation":{},"subject":[],"published":{"date-parts":[[2016,3,21]]},"assertion":[{"value":"2016-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}