{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:04:45Z","timestamp":1725559485518},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258995"},{"type":"electronic","value":"9783540321040"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11424505_26","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T22:11:35Z","timestamp":1279059095000},"page":"269-278","source":"Crossref","is-referenced-by-count":8,"title":["Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Rosa","family":"Mavropodi","sequence":"first","affiliation":[]},{"given":"Panayiotis","family":"Kotzanikolaou","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-540-48000-6_22","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"M. Burmester","year":"1999","unstructured":"Burmester, M., Desmedt, Y.: Secure communication in an unknown network using certificates. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 274\u2013287. Springer, Heidelberg (1999)"},{"volume-title":"Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004)","year":"2004","author":"M. Burmester","key":"26_CR2","unstructured":"Burmester, M., van Le, T.: Secure multipath communication in mobile ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004), Las Vegas. IEEE, Los Alamitos (2004)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","first-page":"3201","volume-title":"Web Communication Technologies and Internet-Related Social Issues - HSI 2003","author":"G. Koh","year":"2003","unstructured":"Koh, G., Oh, D., Woo, H.: A graph-based approach to compute multiple paths in mobile ad hoc networks. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol.\u00a02713, pp. 3201\u20133205. Springer, Heidelberg (2003)"},{"key":"26_CR4","first-page":"89","volume-title":"Proceedings of the WONSS 2005 Conference","author":"P. Kotzanikolaou","year":"2005","unstructured":"Kotzanikolaou, P., Mavropodi, R., Douligeris, C.: Secure multipath routing for mobile ad hoc networks. In: Proceedings of the WONSS 2005 Conference, St. Moritz, Switzerland, January 19-21, pp. 89\u201396. IEEE, Los Alamitos (2005)"},{"key":"26_CR5","first-page":"3201","volume-title":"Proceedings of ICC 2001","author":"S.-J. Lee","year":"2001","unstructured":"Lee, S.-J., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of ICC 2001, Helsinki, Finland, pp. 3201\u20133205. IEEE, Los Alamitos (2001)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review\u00a06(3) (2002)","DOI":"10.1145\/581291.581305"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Nasipuri, A., Das, S.R.: On-demand multipath routing for mobile ad hoc networks. In: Proceedings of IEEE INFOCOM 1999, pp. 64\u201370 (1999)","DOI":"10.1109\/ICCCN.1999.805497"},{"key":"26_CR8","unstructured":"Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), TX, San Antonio (January 2002)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-24614-5_13","volume-title":"Wireless On-Demand Network Systems","author":"A.P. Subramanian","year":"2004","unstructured":"Subramanian, A.P., Anto, A.J., Vasudevan, J., Narayanasamy, P.: Multipath power sensitive routing protocol for mobile ad hoc networks. In: Battiti, R., Conti, M., Cigno, R.L. (eds.) WONS 2004. LNCS, vol.\u00a02928, pp. 171\u2013183. Springer, Heidelberg (2004)"},{"issue":"11","key":"26_CR10","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/35.965371","volume":"39","author":"A. Tsirigos","year":"2001","unstructured":"Tsirigos, A., Haas, Z.J.: Multipath routing in the presence of frequent topological changes. IEEE Communications Magazine\u00a039(11), 132\u2013138 (2001)","journal-title":"IEEE Communications Magazine"},{"issue":"1-4","key":"26_CR11","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1023\/A:1023478518008","volume":"22","author":"J. Wu","year":"2003","unstructured":"Wu, J.: An extended dynamic source routing scheme in ad hoc wireless networks. Telecommunication Systems\u00a022(1-4), 61\u201375 (2003)","journal-title":"Telecommunication Systems"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11424505_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:05:17Z","timestamp":1619507117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11424505_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258995","9783540321040"],"references-count":11,"URL":"http:\/\/dx.doi.org\/10.1007\/11424505_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}