{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:50:26Z","timestamp":1725454226044},"publisher-location":"New York","reference-count":19,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387244859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24486-7_3","type":"book-chapter","created":{"date-parts":[[2005,10,9]],"date-time":"2005-10-09T18:15:45Z","timestamp":1128881745000},"page":"31-45","source":"Crossref","is-referenced-by-count":2,"title":["Local Management of Credits and Debits in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Martinelli","sequence":"first","affiliation":[]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Vaccarelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Balfanz, D., Smetters, D., Stewart, P., and Wong, H. C. (2002). Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In Proc. of NDSS'02. The Internet Society."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Buchegger, S. and Boudec, J. L. (2002). Performance Analysis of the CONFIDANT Protocol. Cooperation Of Nodes \u2014 Fairness In Dynamic Ad-hoc Networks. In Proc. of ACM MobiHoc'02.","DOI":"10.1145\/513800.513828"},{"key":"3_CR3","unstructured":"Buttyan, L. and Hubaux, J. (2002). Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM\/Kluwer Mobile Networks and Applications (MONET), 8(5)."},{"issue":"1","key":"3_CR4","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1006\/inco.2000.2916","volume":"165","author":"R. Gennaro","year":"2001","unstructured":"Gennaro, R. and Rohatgi, P. (2001). How to Sign Digital Streams. Information and Computation, 165(1): 100\u2013116.","journal-title":"Information and Computation"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Hu, Y., Perrig, A., and Johnson, D. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002).","DOI":"10.1145\/570645.570648"},{"key":"3_CR6","unstructured":"Johnson, D., Maltz, D., and Broch, J. (Addison-Wesley, 2001). DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Ad Hoc Networking, chapter 5, pages 139\u2013172."},{"key":"3_CR7","unstructured":"Jong-Wook, P. and Polk, T. (Internet Draft, October 2003). Internet X.509 Public Key Infrastructure Subject Identification Method SIM."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Lamparter, B., Plaggemeier, M., and Westhoff, D. (2003). About the Impact of Co-operation Approaches for Ad Hoc Networks. In Proc. of ACM MobiHoc'03.","DOI":"10.1145\/961268.961283"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., and Baker, M. (2000). Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proc. of MobiCom'00, pages 255\u2013265. ACM.","DOI":"10.1145\/345910.345955"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Michiardi, P. and Molva, R. (2002a). Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In Proc. of CMS'02.","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"3_CR11","unstructured":"Michiardi, P. and Molva, R. (2002b). Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. In Proc. of European Wireless'02."},{"key":"3_CR12","unstructured":"Michiardi, P. and Molva, R. (2003). A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile Ad hoc Networks. In Proc. of WiOpt'03."},{"key":"3_CR13","unstructured":"of the IEEE Computer Society, L. M. S. C. (1999). Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. In IEEE Standard 802.11, 1999 Edition."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Pinkas, D. and Gindin, T. (Internet Draft, January 2004). Internet X.509 Public Key Infrastructure Permanent Identifier.","DOI":"10.17487\/rfc4043"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Salem, N. B., Buttyan, L., Hubaux, J., and Jakobsson, M. (2003). A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks. In Proc. of ACM MobiHoc'03.","DOI":"10.1145\/778415.778418"},{"key":"3_CR16","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/10720107_24","volume":"1796","author":"F. Stajano","year":"1999","unstructured":"Stajano, F. and Anderson, R. (1999). The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks. In Proc. of 7th Security Protocols Workshop, volume LNCS 1796, pages 172\u2013194.","journal-title":"Proc. of 7th Security Protocols Workshop"},{"key":"3_CR17","unstructured":"Urpi, A., Bonuccelli, M., and Giordano, S. (2003). Modelling Cooperation in Mobile Ad-hoc Networks: a Formal Description of Selfishness. In Proc. of WiOpt'03."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Zhong, S., Chen, J., and Yang, Y. (2003). Sprite: a Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. In Proc. of IEEE Infocom'03.","DOI":"10.1109\/INFCOM.2003.1209220"},{"issue":"6","key":"3_CR19","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L. and Haas, Z. (1999). Securing Ad Hoc Networks. IEEE Network, 13(6):24\u201330.","journal-title":"IEEE Network"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Communications and Multimedia Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24486-7_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:58:37Z","timestamp":1605625117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24486-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387244859"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/0-387-24486-7_3","relation":{},"subject":[]}}