{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:16:45Z","timestamp":1729642605736,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/waina.2014.85","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T17:09:37Z","timestamp":1406567377000},"page":"530-535","source":"Crossref","is-referenced-by-count":3,"title":["C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Sanjay K.","family":"Dhurandher","sequence":"first","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]},{"given":"Issa","family":"Traore","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2008.0315"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861384"},{"key":"1","first-page":"255","article-title":"Mitigating routing misbehaviour in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proc of ACM MobiCom"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2011.040773"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"5","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.3844\/jcssp.2012.1397.1406","article-title":"A policy based scheme for combined data security in mobile ad hoc networks","volume":"8","author":"kartheesn","year":"2012","journal-title":"Journal of Computer Science"},{"key":"4","article-title":"Identity based secure routing for wireless ad-hoc networks","volume":"2","author":"sharma","year":"2009","journal-title":"Intl Journal of Recent Trends in Engineering Academic Publisher"},{"journal-title":"Global Mobile Information Systems Simulation Library","year":"0","key":"9"},{"key":"8","first-page":"189","article-title":"Multi-path and message trustbased secure routing in ad hoc networks","author":"dhurandher","year":"2009","journal-title":"Proc of Intl Conference on Advances in Computing Control & Telecommunication Technologies"}],"event":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA)","start":{"date-parts":[[2014,5,13]]},"location":"BC, Canada","end":{"date-parts":[[2014,5,16]]}},"container-title":["2014 28th International Conference on Advanced Information Networking and Applications Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6843234\/6844560\/06844691.pdf?arnumber=6844691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:26:50Z","timestamp":1498138010000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6844691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/waina.2014.85","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}