{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:42Z","timestamp":1725808422479},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_83","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T11:09:45Z","timestamp":1414753785000},"page":"747-755","source":"Crossref","is-referenced-by-count":1,"title":["Secured Categorization and Group Encounter Based Dissemination of Post Disaster Situational Data Using Peer-to-Peer Delay Tolerant Network"],"prefix":"10.1007","author":[{"given":"Souvik","family":"Basu","sequence":"first","affiliation":[]},{"given":"Siuli","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"83_CR1","unstructured":"Luo, H., Kravets, R., Abdelzaher, T.: The-Day-After Networks: A First-Response Edge-Network Architecture for Disaster Relief, NSF NeTS FIND Initiative, 2006-2010"},{"key":"83_CR2","unstructured":"World Disasters Report 2013 - Focus on technology and the future of humanitarian action, International Federation of Red Cross and Red Crescent Societies"},{"key":"83_CR3","doi-asserted-by":"crossref","unstructured":"Mehrotra, S., Butts, C., Kalashnikov, D., Venkatasubramanian, Huyck, C.: Project Rescue: Challenges in Responding to the Unexpected. In: Proceedings of EIST 2004 (2004)","DOI":"10.1117\/12.537805"},{"key":"83_CR4","doi-asserted-by":"crossref","unstructured":"Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of SIGCOMM (2003)","DOI":"10.1145\/863955.863960"},{"key":"83_CR5","doi-asserted-by":"crossref","unstructured":"Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fall, K., Weiss, H.: Delay-Tolerant Networking Architecture. RFC 4838 (Informational). Internet Engineering Task Force (April 2007)","DOI":"10.17487\/rfc4838"},{"key":"83_CR6","unstructured":"Fall, K., Iannaccone, G., Kannan, J., Silveira, F., Taft, N.: A Disruption-Tolerant Architecture for Secure and Efficient Disaster Response Communications. In: Proceedings of ISCRAM (2010)"},{"key":"83_CR7","unstructured":"Chenji, H., Hassanzadeh, A., Won, M., Li, Y., Zhang, W., Yang, X., Stoleru, R., Zhou, G.: A Wireless Sensor, AdHoc and Delay Tolerant Network System for Disaster Response. Technical Report LENSS-09-02"},{"key":"83_CR8","doi-asserted-by":"crossref","unstructured":"Ntareme, H., Zennaro, M., Pehrson, B.: Delay Tolerant Network on smartphones: Applications or communication challenged areas. In: Proceedings of ExtremeCom (2011)","DOI":"10.1145\/2414393.2414407"},{"key":"83_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public-key encryption with keyword search. In: Eurocrypt (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"83_CR10","doi-asserted-by":"crossref","unstructured":"Lindgren, A., Doria, A., Davies, E., Grasic, S.: Probabilistic routing protocol for intermittently connected networks. draft-lindgren-dtnrg-prophet-09.txt (2011)","DOI":"10.17487\/rfc6693"},{"key":"83_CR11","doi-asserted-by":"crossref","unstructured":"Grasic, S., Davies, E., Lindgren, A., Doria, A.: The Evolution of a DTN Routing Protocol \u2013 PRoPHETv2. In: Proceedings of CHANTS (2011)","DOI":"10.1145\/2030652.2030661"},{"key":"83_CR12","unstructured":"Hsu, S.T., Yang, C.C., Hwang, M.S.: A Study of Public Key Encryption with Keyword Search. International Journal of Network Security\u00a015(2) (March 2013)"},{"key":"83_CR13","doi-asserted-by":"crossref","unstructured":"Shikfa, A., \u00d6nen, M., Molva, R.: Privacy in context-based and epidemic forwarding. In: Proceedings of WOWMOM, pp. 1\u20137. IEEE (2009)","DOI":"10.1109\/WOWMOM.2009.5282445"},{"key":"83_CR14","doi-asserted-by":"crossref","unstructured":"Ramanathan, R., Hansen, R., Basu, P., Hain, R.R., Krishnan, R.: Prioritized epidemic routing for opportunistic networks. In: MobiOpp 2007, New York, USA (2007)","DOI":"10.1145\/1247694.1247707"},{"key":"83_CR15","doi-asserted-by":"crossref","unstructured":"Joe, I., Kim, S.B.: A Message Priority Routing Protocol for Delay Tolerant Networks in Disaster Areas. In: Future Generation Information Technology, pp. 727\u2013737 (2010)","DOI":"10.1007\/978-3-642-17569-5_72"},{"key":"83_CR16","doi-asserted-by":"crossref","unstructured":"Mashhadi, A., Capra, L.: Priority Scheduling for Participatory DTN. In: Proceedings of WoWMoM (2011)","DOI":"10.1109\/WoWMoM.2011.5986207"},{"key":"83_CR17","doi-asserted-by":"crossref","unstructured":"Burgess, J., Gallagher, Jensen, B.D., Levine, B.N.: MaxProp: Routing for Vehicle-Based Disruption- Tolerant Networks. In: proceedings of IEEE Infocom (2006)","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"83_CR18","unstructured":"http:\/\/www.ifrc.org\/en\/what-we-do\/disastermanagement\/responding\/disaster-response-system\/dr-tools-and-systems\/eru\/types-of-eru\/"},{"key":"83_CR19","unstructured":"http:\/\/www.jica.go.jp\/english\/our_work\/types_of_assistance\/emergency.html"},{"key":"83_CR20","unstructured":"http:\/\/www.ndtv.com\/article\/india\/uttarakhand-1-350-evacuated-from-badrinath-united-nations-says-over-11-000-issing386683"},{"key":"83_CR21","unstructured":"http:\/\/www.ndtv.com\/article\/india\/uttarakhand-thousands-still-stranded-see-over-view-383781"},{"key":"83_CR22","unstructured":"http:\/\/google.org\/crisismap\/2013-uttrakhand-floods?gl=in"},{"key":"83_CR23","doi-asserted-by":"crossref","unstructured":"Keranen, A., Ott, J., Karkkainen, T.: The ONE Simulator for DTN Protocol Evaluation. In: SIMUTools 2009 (2009)","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T09:51:47Z","timestamp":1676886707000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_83","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}