{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T11:45:39Z","timestamp":1751888739291,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6133520","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks"],"prefix":"10.1109","author":[{"family":"Jing-Wei Huang","sequence":"first","affiliation":[]},{"given":"I.","family":"Woungang","sequence":"additional","affiliation":[]},{"family":"Han-Chieh Chao","sequence":"additional","affiliation":[]},{"given":"M. S.","family":"Obaidat","sequence":"additional","affiliation":[]},{"family":"Ting-Yun Chi","sequence":"additional","affiliation":[]},{"given":"S. K.","family":"Dhurandher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2020105"},{"journal-title":"NS2 Simulation Package","year":"0","key":"17"},{"key":"18","first-page":"1443","article-title":"Trust-based SAODV Protocol with Intrusion Detection and Incentive Cooperation in MANET","author":"de rango","year":"2009","journal-title":"Proc of the Intl Conference on Wireless Communications and Mobile Computing Connecting the World Wirelessly Leipzig Germany"},{"key":"15","first-page":"2404","article-title":"SPREAD: Enhancing data confidentiality in mobile ad hoc networks","author":"lou","year":"2004","journal-title":"INFOCOM 2004"},{"key":"16","first-page":"222","article-title":"Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control","author":"cheng","year":"2007","journal-title":"IEEE Symposium on Security and Privacy May 20-23 Berkeley CA USA"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2009.55"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992756"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1313337"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1201\/b10904-4"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355173"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/501449.501464"},{"journal-title":"Ad hoc On-demand Distance Vector routing","year":"2001","author":"perkins","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00018-0"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511536700"},{"key":"2","article-title":"An On-Demand Byzantine- Resilient Secure Routing Protocol for Wireless Ad hoc Networks","volume":"10","author":"john","year":"2010","journal-title":"Int J Comput Sci Netw Secur (IJCSNS)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"1","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.comcom.2007.10.021","article-title":"Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing","volume":"31","author":"narula","year":"2008","journal-title":"Computer Communications"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570682"},{"key":"5","first-page":"255","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proc of MobiCom 2000 Boston"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00018-0"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2008.11"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06133520.pdf?arnumber=6133520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T09:31:54Z","timestamp":1497951114000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6133520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":26,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/glocom.2011.6133520","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}