iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/WCNC.2007.488
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:11:08Z","timestamp":1730304668911,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/wcnc.2007.488","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T15:55:04Z","timestamp":1181231704000},"page":"2625-2630","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Distributed Certificate Authority Services for Mobile Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Y.","family":"Dong","sequence":"first","affiliation":[]},{"given":"Victor O. K.","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lucas C. K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/INFCOM.2004.1354661"},{"key":"2","first-page":"251","article-title":"Providing robust and ubiquitous security support for mobile ad-hoc networks","author":"kong","year":"2001","journal-title":"Proc of the International Conference on Network Protocols (ICNP) 2001"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/SECURECOMM.2005.57"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/65.806983"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/SFCS.1997.646127"},{"key":"6","first-page":"457","article-title":"Proactive secret sharing or: How to cope with perpetual leakage","volume":"963","author":"herzberg","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"year":"1997","author":"desmedt","journal-title":"Redistributing secret shares to new access structures and its applications","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/SAINTW.2003.1210190"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/ICNP.2002.1181388"}],"event":{"name":"2007 IEEE Wireless Communications and Networking Conference","start":{"date-parts":[[2007,3,11]]},"location":"Kowloon, China","end":{"date-parts":[[2007,3,15]]}},"container-title":["2007 IEEE Wireless Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4204175\/4224245\/04224733.pdf?arnumber=4224733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T17:38:53Z","timestamp":1489599533000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4224733\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":10,"URL":"http:\/\/dx.doi.org\/10.1109\/wcnc.2007.488","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}