{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T08:44:08Z","timestamp":1725439448596},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8]]},"DOI":"10.1109\/ias.2007.14","type":"proceedings-article","created":{"date-parts":[[2007,10,15]],"date-time":"2007-10-15T15:11:59Z","timestamp":1192461119000},"page":"241-246","source":"Crossref","is-referenced-by-count":1,"title":["Analysing the Security Threats against Network Convergence Architectures"],"prefix":"10.1109","author":[{"given":"Patroklos","family":"Argyroudis","sequence":"first","affiliation":[]},{"given":"Robert","family":"McAdoo","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Toner","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Doyle","sequence":"additional","affiliation":[]},{"given":"Donal","family":"O'Mahony","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637243"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The Sybil Attack","author":"douceur","year":"2002","journal-title":"Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS'02)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(01)00304-1"},{"journal-title":"Federal Bridge Certification Authority (FBCA","article-title":"X.509 Certificate Policy for the Federal Bridge Certification Authority (FBCA)","year":"2002","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/3-540-45748-8_25","article-title":"Security Considerations for Peer-to-Peer Distributed Hash Tables","author":"sit","year":"2002","journal-title":"Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS'02)"},{"key":"ref15","first-page":"42","article-title":"A Survey of Peer-to-Peer Security Issues","author":"wallach","year":"2003","journal-title":"Proceedings of 2003 International Symposium on Software Security (ISSS'03)"},{"key":"ref16","article-title":"A Security Strategy for Mobile E-business","author":"keely","year":"2001","journal-title":"Tech Rep GSOEE213"},{"article-title":"TRANSIT: Adapting the Internet for Mobile and Ad hoc Operation","year":"2006","author":"toner","key":"ref4"},{"key":"ref3","article-title":"OCALA: an Architecture for Supporting Legacy Applications over Overlays","author":"joseph","year":"2006","journal-title":"Proceedings of 3rd USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI '06)"},{"key":"ref6","first-page":"21","article-title":"Attack Trees","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1215663"},{"key":"ref8","article-title":"Generic Threats to Routing Protocols","author":"barbir","year":"2004","journal-title":"IETF Draft draft-ietfrpsec-routing-threats-07"},{"key":"ref7","article-title":"Threat Analysis of the Domain Name System (DNS)","author":"atkins","year":"2004","journal-title":"RFC 3833"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502048"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610547"}],"event":{"name":"Third International Symposium on Information Assurance and Security","start":{"date-parts":[[2007,8,29]]},"location":"Manchester, UK","end":{"date-parts":[[2007,8,31]]}},"container-title":["Third International Symposium on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4299731\/4299732\/04299781.pdf?arnumber=4299781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T23:55:15Z","timestamp":1497743715000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4299781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ias.2007.14","relation":{},"subject":[],"published":{"date-parts":[[2007,8]]}}}