{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T16:40:09Z","timestamp":1748709609901,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319257433"},{"type":"electronic","value":"9783319257440"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25744-0_14","type":"book-chapter","created":{"date-parts":[[2015,11,29]],"date-time":"2015-11-29T12:46:38Z","timestamp":1448801198000},"page":"163-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CBUPRE to Secure MANETs from DoS Attacks"],"prefix":"10.1007","author":[{"given":"Radha Krishna","family":"Reddy Pallavali","sequence":"first","affiliation":[]},{"given":"Samia","family":"Bouzefrane","sequence":"additional","affiliation":[]},{"given":"Selma","family":"Boumerdassi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Kaur, T., Toor, A., Saluja, K.: Defending manets against flooding attacks for military applications under group mobility. In: 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1\u20136 (2014)","DOI":"10.1109\/RAECS.2014.6799499"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Konate, K., Abdourahime, G.: Attacks analysis in mobile ad hoc networks: modeling and simulation. In: 2011 Second International Conference on Intelligent Systems, Modeling and Simulation (ISMS), pp. 367\u2013372 (2011)","DOI":"10.1109\/ISMS.2011.85"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Soryal, J., Saadawi, T.: IEEE 802.11 denial of service attack detection in manet. In: Wireless Telecommunications Symposium (WTS), pp. 1\u20138 (2012)","DOI":"10.1109\/WTS.2012.6266083"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Pushpalatha, K., Chitra, M.: Gamanet: A ganatic algorithm approach for hierarchical group key management in mobile adhoc network. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 368\u2013373 (2013)","DOI":"10.1109\/ICPRIME.2013.6496503"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Reddy, P.R.K., Bouzefrane, S.: Analysis and detection of dos attacks in cloud computing by using qse algorithm. In: 2014 IEEE International Conference on High Performance Computing and Communications, 2014 IEEE 6th International Symposium on Cyberspace Safety and Security, 2014 IEEE 11th International Conference on Embedded Software and Systems (HPCC,CSS,ICESS), pp. 1089\u20131096 (2014)","DOI":"10.1109\/HPCC.2014.183"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Lolla, V., Law, L., Krishnamurthy, S., Ravishankar, C., Manjunath, D.: Detecting mac layer back-o timer violations in mobile ad hoc networks. In: 26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006, p. 63 (2006)","DOI":"10.1109\/ICDCS.2006.28"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Jia, Q., Sun, K., Stavrou, A.: Capman: capability-based defense against multi-path denial of service (dos) attacks in manet. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20136 (2011)","DOI":"10.1109\/ICCCN.2011.6005808"},{"key":"14_CR8","unstructured":"MacVittie, L.: Understanding advanced data compression (2013)"},{"key":"14_CR9","unstructured":"Base, O.D.: Oracle advanced compression with oracle database 12c (2015)"},{"key":"14_CR10","unstructured":"Oberhumer, M.F.: lzop (2010)"},{"key":"14_CR11","unstructured":"Seward, J.: bzip2 and libbzip2, version 1.0.5, a program and library for data compression (2007)"},{"key":"14_CR12","unstructured":"loup Gailly, J., Adler, M.: A massively spiffy yet delicately unobtrusive compression library (2013)"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"4042","DOI":"10.1016\/j.ins.2010.06.029","volume":"180","author":"H Wang","year":"2010","unstructured":"Wang, H., Cao, Z., Wang, L.: Multi-use and unidirectional identity-based proxy re- encryption schemes. Inf. Sci. 180, 4042\u20134059 (2010)","journal-title":"Inf. Sci."},{"key":"14_CR14","unstructured":"Smith, T.: Dvd jon: buy drm-less tracks from apple itunes, 18 March 2005"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9, 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"14_CR16","unstructured":"Ivan, A.A., Dodis, Y.: Proxy cryptography revisited. In: NDSS (2003)"},{"key":"14_CR17","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.24297\/ijct.v10i8.1472","volume":"10","author":"PRK Reddy","year":"2013","unstructured":"Reddy, P.R.K., Sivaramaiah, S., Sesadri, U.: Secure data forwarding in cloud storage system by using umib proxy. Int. J. Comput. Technol. 10, 1905\u20131912 (2013)","journal-title":"Int. J. Comput. Technol."},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-0-387-33112-6_5","volume-title":"Wireless Network Security","author":"B Wu","year":"2007","unstructured":"Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.-Z. (eds.) Wireless Network Security, pp. 103\u2013135. Springer, USA (2007)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Gupta, H., Shrivastav, S., Sharma, S.: Detecting the dos attacks in aomdv using aomdv- ids routing. In: 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 380\u2013384 (2013)","DOI":"10.1109\/CICN.2013.84"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Gaiti, D.: Denial of service (dos) attacks detection in manets through statistical models. In: Global Information Infrastructure and Networking Symposium (GIIS), pp. 1\u20133 (2014)","DOI":"10.1109\/GIIS.2014.6934261"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Ahir, S., Marathe, N., Padiya, P.: Iamtt - new method for resisting network layer denial of service attack on manet. In: 2014 Fourth International Conference on Communication Systems and Network Technologies (CSNT), pp. 762\u2013766 (2014)","DOI":"10.1109\/CSNT.2014.160"},{"key":"14_CR22","unstructured":"Allen Kent, J.G.W.: Artificial Intelligence and ADA to Systems Integration: Concepts: Methods, and Tools (1992)"},{"key":"14_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9, 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Ouyang, T., Jin, S., Rabinovich, M.: Dynamic tcp proxies: coping with disadvantaged hosts in manets. In: 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2009, pp. 530\u2013536 (2009)","DOI":"10.1109\/ICDCSW.2009.80"},{"key":"14_CR25","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-40597-6_2","volume-title":"Advances in Security of Information and Communication Networks","author":"A El-Sayed","year":"2013","unstructured":"El-Sayed, A.: Clustering Based Group Key Management for MANET. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds.) SecNet 2013. CCIS, vol. 381, pp. 11\u201326. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25744-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T16:00:18Z","timestamp":1748707218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25744-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319257433","9783319257440"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25744-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}