{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:35Z","timestamp":1738777235519,"version":"3.37.0"},"reference-count":6,"publisher":"Academy Publisher","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.01.231-237","type":"journal-article","created":{"date-parts":[[2014,1,4]],"date-time":"2014-01-04T01:10:09Z","timestamp":1388797809000},"source":"Crossref","is-referenced-by-count":0,"title":["Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks"],"prefix":"10.4304","volume":"9","author":[{"given":"Liangyu","family":"Luan","sequence":"first","affiliation":[]},{"given":"Yingfang","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,1,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416357"},{"issue":"Nov","key":"ref2","first-page":"178","article-title":"Authentication in Multi-Hop Wireless Mesh Networks","volume":"16","author":"Khan","year":"2006","unstructured":"[9] Khan, K. and Akbar, M., \"Authentication in Multi-Hop Wireless Mesh Networks\", Transactions on Engineering, Computing and Technology, Vol. 16, Nov. 2006, pp. 178-183.","journal-title":"Transactions on Engineering Computing and Technology"},{"key":"ref3","first-page":"342","article-title":"Toward Secure Key Distribution in Truly Ad-Hoc Networks","volume-title":"Proc Symp on Applications and the Internet Workshop","author":"Khalili","year":"2003","unstructured":"[10] Khalili, A., Katz, J. and Arbaugh, W.A., \"Toward Secure Key Distribution in Truly Ad-Hoc Networks\", In Proc. Symp, on Applications and the Internet Workshop, 2003, pp. 342-346."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"issue":"No. 3","key":"ref5","first-page":"398","article-title":"The Signature Scheme with Fault Tolerance based on Threshold","volume":"21","author":"Zhang","year":"2004","unstructured":"[12] Zhang, X., \"The Signature Scheme with Fault Tolerance based on Threshold\", Journal of the Graduate School of the Chinese Academy of Sciences, Vol. 21 No. 3, July 2004, pp. 398-401.","journal-title":"Journal of the Graduate School of the Chinese Academy of Sciences"},{"issue":"No. 3","key":"ref6","first-page":"221","article-title":"An Application for a Fast Data Encryption Standard Implementation","volume":"1","author":"Bishop","year":"1988","unstructured":"[14] Bishop, M., \"An Application for a Fast Data Encryption Standard Implementation\", Computing Systems, Vol. 1, No. 3, 1988, pp. 221\u2013254.","journal-title":"Computing Systems"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:04:40Z","timestamp":1738775080000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":6,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2014,1,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.01.231-237","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}