{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T04:53:40Z","timestamp":1694753620947},"reference-count":9,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2010,1,4]],"date-time":"2010-01-04T00:00:00Z","timestamp":1262563200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Communications"],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1002\/wcm.883","type":"journal-article","created":{"date-parts":[[2010,1,4]],"date-time":"2010-01-04T13:39:20Z","timestamp":1262612360000},"page":"593-595","source":"Crossref","is-referenced-by-count":0,"title":["Special issue on \u201cquality of service and security in wireless and mobile networks\u201d"],"prefix":"10.1002","volume":"10","author":[{"given":"Luciano","family":"Bononi","sequence":"first","affiliation":[]},{"given":"Hsiao\u2010Hwa","family":"Chen","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,1,4]]},"reference":[{"key":"e_1_2_2_2_2","doi-asserted-by":"crossref","unstructured":"BoggiaG CamardaP GriecoLA.Scheduling channel time allocations in 802.15.3 WPANs for supporting multimedia applications.Wireless Communications and Mobile Computing2009; DOI:10.1002\/wcm.730","DOI":"10.1002\/wcm.730"},{"key":"e_1_2_2_3_2","doi-asserted-by":"crossref","unstructured":"ChenF WangN GermanR DresslerF.Simulation study of IEEE 802.15.4 LR\u2010WPAN for industrial applications.Wireless Communications and Mobile Computing2009; DOI:10.1002\/wcm.736","DOI":"10.1002\/wcm.736"},{"key":"e_1_2_2_4_2","doi-asserted-by":"crossref","unstructured":"AskoxylakisI Bencs\u00e1thB Butty\u00e1nL et al.Securing multi\u2010operator\u2010based QoS\u2010aware mesh networks: requirements and design options.Wireless Communications and Mobile Computing2008; DOI:10.1002\/wcm.728","DOI":"10.1002\/wcm.728"},{"key":"e_1_2_2_5_2","doi-asserted-by":"crossref","unstructured":"MoraruL LeoneP NikoletseasS RolimJ.Path quality detection algorithms for near optimal geographic routing in sensor networks with obstacles.Wireless Communications and Mobile Computing2008; DOI:10.1002\/wcm.727","DOI":"10.1002\/wcm.727"},{"key":"e_1_2_2_6_2","doi-asserted-by":"crossref","unstructured":"RahmanM NasserN TalebT.Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve.Wireless Communications and Mobile Computing2009; DOI:10.1002\/wcm.735","DOI":"10.1002\/wcm.735"},{"key":"e_1_2_2_7_2","doi-asserted-by":"crossref","unstructured":"RenY BoukercheA.ARMA: a scalable secure routing protocol with privacy protection for mobilead hocnetworks.Wireless Communications and Mobile Computing2009; DOI:10.1002\/wcm.737","DOI":"10.1002\/wcm.737"},{"key":"e_1_2_2_8_2","doi-asserted-by":"crossref","unstructured":"Ruiz MartinezPM Marin LopezR RosFJ MartinezJA.Enhanced access control in hybrid MANETs through utility\u2010based pre\u2010authentication control.Wireless Communications and Mobile Computing2008; DOI:10.1002\/wcm.729","DOI":"10.1002\/wcm.729"},{"key":"e_1_2_2_9_2","doi-asserted-by":"crossref","unstructured":"AlnifieG SimonR.MULEPRO: a multi\u2010channel response to jamming attacks in wireless sensor networks.Wireless Communications and Mobile Computing2009; DOI:10.1002\/wcm.734","DOI":"10.1002\/wcm.734"},{"key":"e_1_2_2_10_2","doi-asserted-by":"crossref","unstructured":"ZiaTA ZomayaAY.Quality of security through triple key scheme in wireless sensor networks.Wireless Communications and Mobile Computing2009; DOI:10.1002\/wcm.733","DOI":"10.1002\/wcm.733"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fwcm.883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/wcm.883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T09:50:53Z","timestamp":1694685053000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/wcm.883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,4]]},"references-count":9,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["10.1002\/wcm.883"],"URL":"https:\/\/doi.org\/10.1002\/wcm.883","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,4]]}}}