{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T13:40:03Z","timestamp":1715175603077},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,4,8]],"date-time":"2013-04-08T00:00:00Z","timestamp":1365379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-100","type":"journal-article","created":{"date-parts":[[2013,4,8]],"date-time":"2013-04-08T12:14:25Z","timestamp":1365423265000},"source":"Crossref","is-referenced-by-count":0,"title":["Intrusion tolerant QoS provision in mobile multihop relay networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"Neila","family":"Krichene","sequence":"first","affiliation":[]},{"given":"Noureddine","family":"Boudriga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,8]]},"reference":[{"key":"695_CR1","volume-title":"Part 16: Air Interface for Broadband Wireless Access Systems, Amendment 1: Multihop Relay Specification, IEEE std 802.16j-2009, IEEE Computer Society and IEEE Microwave Theory and Techniques Society Std","author":"IEEE standard for local and metropolitan area networks","year":"2009","unstructured":"IEEE standard for local and metropolitan area networks: Part 16: Air Interface for Broadband Wireless Access Systems, Amendment 1: Multihop Relay Specification, IEEE std 802.16j-2009, IEEE Computer Society and IEEE Microwave Theory and Techniques Society Std. 2009."},{"key":"695_CR2","volume-title":"Part 16: Air Interface for Broadband Wireless Access Systems, IEEE std 802.16-2009, IEEE Computer Society and IEEE Microwave Theory and Techniques Society Std","author":"IEEE standard for local and metropolitan area networks","year":"2009","unstructured":"IEEE standard for local and metropolitan area networks: Part 16: Air Interface for Broadband Wireless Access Systems, IEEE std 802.16-2009, IEEE Computer Society and IEEE Microwave Theory and Techniques Society Std. 2009."},{"key":"695_CR3","volume-title":"Tech. Rep. MAFTIA deliverable D21","author":"D Powell","year":"2003","unstructured":"Powell D, Stroud R: Conceptual Model and Architecture of MAFTIA. Tech. Rep. MAFTIA deliverable D21 2003. http:\/\/webhost.laas.fr\/TSF\/cabernet\/maftia\/deliverables\/D21.pdf"},{"key":"695_CR4","first-page":"1","volume-title":"International Conference on Ubiquitous Information Technologies & Applications (ICUT)","author":"J Chang","year":"2009","unstructured":"Chang J, Hsiao W, Chen J, Chao H: Mobile relay stations navigation-based self-optimization handover mechanism in WiMAX networks. In International Conference on Ubiquitous Information Technologies & Applications (ICUT). Fukuoka; 2009:1-5,. ISBN: 978-1-4244-5131-9"},{"key":"695_CR5","volume-title":"International Conference on Advanced Information Technologies (AIT)","author":"B Chang","year":"2009","unstructured":"Chang B, Hsieh S, Liang Y, Wang D: QoS guarantee-based fast handoff in IEEE 802.16j WiMAX MMR networks. In International Conference on Advanced Information Technologies (AIT). Taiwan; 2009."},{"issue":"3","key":"695_CR6","doi-asserted-by":"publisher","first-page":"403","DOI":"10.3745\/JIPS.2010.6.3.403","volume":"6","author":"D-H Kim","year":"2010","unstructured":"Kim D-H, Kim S-S, Lee Y-H: Speed-sensitive handover scheme over IEEE 802.16 multi-relay networks. J. Inf. Process. Syst 2010, 6(3):403-412.","journal-title":"J. Inf. Process. Syst"},{"key":"695_CR7","first-page":"808","volume-title":"International Conference on Sensor Technologies and Applications","author":"S Ann","year":"2008","unstructured":"Ann S, Lee KG, Kim HS: A path selection method in IEEE 802.16j mobile multi-hop relay networks. In International Conference on Sensor Technologies and Applications. Cap Esterel; 2008:808-812. ISBN: 978-0-7695-3330-8"},{"key":"695_CR8","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-0-387-34738-7_3","volume-title":"IFIP Book Series, Ad-Hoc Networking","author":"N Krichene","year":"2006","unstructured":"Krichene N, Boudriga N: On a QoS intrusion tolerant routing protocol in ad-hoc networks. In IFIP Book Series, Ad-Hoc Networking. Santiago, Chile; 2006:29-46."},{"key":"695_CR9","first-page":"1","volume-title":"IFIP Int. Conference on Wireless and Optical Communications Networks (WOCN)","author":"N Krichene","year":"2007","unstructured":"Krichene N, Boudriga N: Intrusion tolerant routing for mesh networks. In IFIP Int. Conference on Wireless and Optical Communications Networks (WOCN). Singapore; 2007:1-7. ISBN: 1-4244-1005-3"},{"key":"695_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MWC.2008.4653133","volume":"15","author":"V Genc","year":"2008","unstructured":"Genc V, Murphy S, Yu Y, Murphy J: IEEE 802.16j relay-based wireless access networks: an overview. IEEE Wirel. Commun 2008, 15: 56-63.","journal-title":"IEEE Wirel. Commun"},{"key":"695_CR11","first-page":"295","volume-title":"Association for Computing Machinery (ACM)","author":"WG Bouricius","year":"1969","unstructured":"Bouricius WG, Carter WC, Schneider PR: Reliability modeling techniques for self-repairing computer systems. In Association for Computing Machinery (ACM). New York; 1969:295-309."},{"key":"695_CR12","unstructured":"The MAFTIA project Internet site, http:\/\/webhost.laas.fr\/TSF\/cabernet\/maftia\/programme\/"},{"key":"695_CR13","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/DASC.2006.30","volume-title":"IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)","author":"R Ma","year":"2006)","unstructured":"Ma R, Xing L, Michel H: Fault-intrusion tolerant techniques in wireless sensor networks. In IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC). (Indianapolis; 2006):85-94."},{"issue":"4","key":"695_CR14","first-page":"293","volume":"12","author":"F Tang","year":"2007","unstructured":"Tang F, Guo M, Li M, Wang C, Dong M: Secure routing for wireless mesh sensor networks in pervasive environments. Int. J. Intell. Control Syst 2007, 12(4):293-306.","journal-title":"Int. J. Intell. Control Syst"},{"issue":"5","key":"695_CR15","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig A, Szewczyk R, Tygar JD, Wen V: DE Culler, SPINS: security protocols for sensor networks. J. Wirel. Netw 2002, 8(5):521-534. 10.1023\/A:1016598314198","journal-title":"J. Wirel. Netw"},{"key":"695_CR16","volume-title":"Tech. Rep. MAFTIA delivrable D9","author":"N Ferreira","year":"2002","unstructured":"Ferreira N, Verrissimo P: Complete specification of APIs and protocols for the MAFTIA middleware. Tech. Rep. MAFTIA delivrable D9 2002. http:\/\/webhost.laas.fr\/TSF\/cabernet\/maftia\/deliverables\/D9.pdf"},{"key":"695_CR17","unstructured":"Toncar V, Voip basics Aboutjitter http:\/\/toncar.cz\/Tutorials\/VoIP\/VoIP\\_Basics\\_Jitter.html"},{"issue":"6","key":"695_CR18","first-page":"2192","volume":"2","author":"AS Khan","year":"2010","unstructured":"Khan AS, Fisal N, Kamilah S, Abbas M: Efficient distributed authentication key scheme for multi-hop relay in IEEE 802.16j network. Int. J. Eng. Sci. Technol 2010, 2(6):2192-2199.","journal-title":"Int. J. Eng. Sci. Technol"},{"key":"695_CR19","volume-title":"Tech. Rep. MAFTIA delivrable D22","author":"A Adelsbach","year":"2003","unstructured":"Adelsbach A, Creese S: Final Report on Verification and Assessment. Tech. Rep. MAFTIA delivrable D22 2003. http:\/\/webhost.laas.fr\/TSF\/cabernet\/maftia\/deliverables\/D22.pdf"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-100\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-100.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-100.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T13:17:42Z","timestamp":1715174262000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,8]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["695"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-100","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,8]]},"article-number":"100"}}