{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:40Z","timestamp":1750308760600,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,9,24]],"date-time":"2009-09-24T00:00:00Z","timestamp":1253750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,9,24]]},"DOI":"10.1145\/1636682.1636685","type":"proceedings-article","created":{"date-parts":[[2009,10,27]],"date-time":"2009-10-27T13:27:28Z","timestamp":1256650048000},"page":"11-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Securing wireless mesh networks"],"prefix":"10.1145","author":[{"given":"Viviane","family":"Lima","sequence":"first","affiliation":[{"name":"Center for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]},{"given":"Vitor","family":"Ruivo","sequence":"additional","affiliation":[{"name":"Center for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]},{"given":"Marilia","family":"Curado","sequence":"additional","affiliation":[{"name":"Center for Informatics and Systems of the University of Coimbra, Coimbra, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2009,9,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.12.001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"D. B. Johnson Y. Hu D. Maltz \"The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4\" RFC 4728 February 2007.  D. B. Johnson Y. Hu D. Maltz \"The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4\" RFC 4728 February 2007.","DOI":"10.17487\/rfc4728"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269716"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"e_1_3_2_1_6_1","volume-title":"Multicast Source Authentication Transform Introduction\". RFC","author":"Perrig A.","year":"2005","unstructured":"A. Perrig , D. Song , R. Canetti , J. D. Tygar , B. Briscoe . \" Timed Efficient Stream Loss-Tolerant Authentication (TESLA) : Multicast Source Authentication Transform Introduction\". RFC 4082, June 2005 . A. Perrig, D. Song, R. Canetti, J. D. Tygar, B. Briscoe. \"Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction\". RFC 4082, June 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks","author":"Hu Y.-C.","year":"2002","unstructured":"Y.-C. Hu , D. B. Johnson , A. Perrig . \"SEAD : Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks \". 2002 . Y.-C. Hu, D. B. Johnson, A. Perrig. \"SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks\". 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.842547"},{"key":"e_1_3_2_1_10_1","first-page":"2006","article-title":"Secure Ad hoc On-Demand Distance Vector (SAODV) Routing","author":"Zapata M. G.","year":"2006","unstructured":"M. G. Zapata . \" Secure Ad hoc On-Demand Distance Vector (SAODV) Routing \". Internet Draft: draft-guerrero-manet-saodv-06.txt 2006 . Work in Progress. 2006 . M. G. Zapata. \"Secure Ad hoc On-Demand Distance Vector (SAODV) Routing\". Internet Draft: draft-guerrero-manet-saodv-06.txt 2006. Work in Progress. 2006.","journal-title":"Internet Draft: draft-guerrero-manet-saodv-06.txt"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/520551.837511"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_13_1","volume-title":"Aerospace Conference, 2004. Proceedings, 2004","volume":"2","author":"Li X.","year":"2004","unstructured":"X. Li , M. R. Lyu , J. Liu . \"TAODV : A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks \". Aerospace Conference, 2004. Proceedings, 2004 IEEE. Volume 2 , Issue, 6- -13 March 2004 pp: 1286--1295 Vol. 2. X. Li, M. R. Lyu, J. Liu. \"TAODV: A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks\". Aerospace Conference, 2004. Proceedings, 2004 IEEE. Volume 2, Issue, 6--13 March 2004 pp: 1286--1295 Vol. 2."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of World Academy of Science, Engineering and Technology.","author":"Raghavan V. N.","year":"2006","unstructured":"V. N. Raghavan , T. P. M. Labbai , N. Bhalaji , S. Kesavan . \" Extended Dynamic Source Routing Protocol for the Non Co-Operating Nodes in Mobile Ad hoc Networks \". In Proceedings of World Academy of Science, Engineering and Technology. November , 2006 . V. N. Raghavan, T. P. M. Labbai, N. Bhalaji, S. Kesavan. \"Extended Dynamic Source Routing Protocol for the Non Co-Operating Nodes in Mobile Ad hoc Networks\". In Proceedings of World Academy of Science, Engineering and Technology. November, 2006."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861392"},{"issue":"6","key":"e_1_3_2_1_16_1","article-title":"SWAN: A Secured Watchdog for Ad hoc Networks","volume":"6","author":"Xue X.","year":"2006","unstructured":"X. Xue , J. Leneutre , L. Chen , J. Ben-Othman . \" SWAN: A Secured Watchdog for Ad hoc Networks \". IJCSNS International Journal of Computer Science and Network Security, VOL. 6 No. 6 , June 2006 . X. Xue, J. Leneutre, L. Chen, J. Ben-Othman. \"SWAN: A Secured Watchdog for Ad hoc Networks\". IJCSNS International Journal of Computer Science and Network Security, VOL. 6 No. 6, June 2006.","journal-title":"IJCSNS International Journal of Computer Science and Network Security, VOL."},{"key":"e_1_3_2_1_17_1","first-page":"87","volume-title":"Internet Society","author":"Montenegro G.","year":"2002","unstructured":"G. Montenegro and C. Castelluccia . \" Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses,\" In Proceedings of Network and Distributed Systems Security (NDSS 2002) , Internet Society , 2002 , pp. 87 -- 99 . G. Montenegro and C. Castelluccia. \"Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses,\" In Proceedings of Network and Distributed Systems Security (NDSS 2002), Internet Society, 2002, pp. 87--99."},{"key":"e_1_3_2_1_18_1","volume-title":"Available from: http:\/\/isi.edu\/nsnam\/ns\/ Accessed on","author":"Network Simulator","year":"2009","unstructured":"\" Network Simulator 2\". Available from: http:\/\/isi.edu\/nsnam\/ns\/ Accessed on January 2009 . \"Network Simulator 2\". Available from: http:\/\/isi.edu\/nsnam\/ns\/ Accessed on January 2009."},{"key":"e_1_3_2_1_19_1","volume-title":"Denmark","author":"Song S.","year":"2005","unstructured":"S. Song . \"Dynamic feed-back mechanisms in Trust-Based DSR\". International master's program in Computer System Engineering at DTU Lyngby , Denmark , July 2005 . S. Song. \"Dynamic feed-back mechanisms in Trust-Based DSR\". International master's program in Computer System Engineering at DTU Lyngby, Denmark, July 2005."}],"event":{"name":"LANC '09: IFIP Latin American Networking Conference 2009","sponsor":["CLEI Centro Latinomericano de Estudios en Informatica (Brazil)","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Pelotas Brazil","acronym":"LANC '09"},"container-title":["Proceedings of the 5th International Latin American Networking Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1636682.1636685","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1636682.1636685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:27Z","timestamp":1750278147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1636682.1636685"}},"subtitle":["a winning combination of routing and forwarding mechanisms"],"short-title":[],"issued":{"date-parts":[[2009,9,24]]},"references-count":19,"alternative-id":["10.1145\/1636682.1636685","10.1145\/1636682"],"URL":"https:\/\/doi.org\/10.1145\/1636682.1636685","relation":{},"subject":[],"published":{"date-parts":[[2009,9,24]]},"assertion":[{"value":"2009-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}