{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:33Z","timestamp":1725496233981},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"},{"type":"electronic","value":"9780387736556"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-73655-6_6","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"75-90","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of the implicit trust within the OLSR protocol"],"prefix":"10.1007","author":[{"given":"Asmaa","family":"Adnane","sequence":"first","affiliation":[]},{"suffix":"Jr","given":"Rafael Tim\u00f3teo","family":"de Sousa","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Bidan","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"M\u00e9","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Mui L (2003) Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks, PhD Thesis, Massachusetts Institute of Technology."},{"key":"6_CR2","unstructured":"Clausen T, Laouiti A, Muhlethaler P, Raffo D, Adjih C (2005) Securing the OLSR routing protocol with or without compromised nodes in the network, HAL \u2014 CCSd \u2014 CNRS, INRIA \u2014 Rocquencourt."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Clausen T, Jacquet P (2003) IETF RFC-3626: Optimized Link State Routing Protocol OLSR.","DOI":"10.17487\/rfc3626"},{"key":"6_CR4","volume-title":"SP\u201993: Proceedings of the 1993 IEEE Symposium on Security and Privacy","author":"R. Yahalom","year":"1993","unstructured":"Yahalom R, Klein B, Beth T (1993) Trust Relationships in Secure Systems \u2014 A Distributed Authentication Perspective. In: SP\u201993: Proceedings of the 1993 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, USA."},{"key":"6_CR5","unstructured":"Marsh S (1994) Formalising Trust as a Computational Concept, PhD Thesis. Department of Mathematics and Computer Science, University of Stirling."},{"key":"6_CR6","unstructured":"Raffo D (2005) Security Schemes for the OLSR Protocol for Ad Hoc Networks, PhD Thesis, University of Paris 6 Pierre et Marie Curie."},{"key":"6_CR7","unstructured":"Buchegger S (2004) Coping with Misbehavior in Mobile Ad-hoc Networks, PhD Thesis. IC School of Computer and Communication Sciences, Lausanne university."},{"issue":"Numbers2\u20133","key":"6_CR8","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11235-006-6521-y","volume":"31","author":"A. Fourati","year":"2006","unstructured":"Fourati A, Al Agha K (2006) A Shared Secret-based Algorithm for Securing the OLSR Routing Protocol. Springer Netherlands, Telecommunication Systems, Volume 31, Numbers 2\u20133, pp. 213\u2013226.","journal-title":"Springer Netherlands, Telecommunication Systems"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/11755593_12","volume":"3986\/2006","author":"C. D. Jensen","year":"2006","unstructured":"Jensen C D, Connell P O (2006) Trust-Based Route Selection in Dynamic Source Routing. In: Trust Management, 4th International Conference, iTrust 2006. Springer, Volume 3986\/2006, pp. 150\u2013163, Pisa, Italy.","journal-title":"Trust Management, 4th International Conference"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Michiardi P (2004) Cooperation Enforcement and Network Security Mechanisms for Mobile Ad Hoc Networks, PhD Thesis, Ecole nationale sup\u00e9rieure des t\u00e9l\u00e9communications, Paris.","DOI":"10.1002\/0471656895.ch12"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks. IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 463\u2013469.","DOI":"10.1109\/PCCC.2004.1395061"},{"key":"6_CR12","first-page":"48","volume":"2995\/2004","author":"J. Liu","year":"2004","unstructured":"Liu J, Issarny V (2004) Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Trust Management. 2nd International Conference, iTrust 2004. Springer, Volume 2995\/2004, pp. 48\u201362, Oxford, UK.","journal-title":"Trust Management. 2nd International Conference"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Grandison T, Sloman M (2000) A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials, 4th Quarter, Vol. 3, No. 4.","DOI":"10.1109\/COMST.2000.5340804"},{"key":"6_CR14","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/11537878_18","volume":"3592\/2005","author":"L. Viljanen","year":"2005","unstructured":"Viljanen L (2005) Towards an Ontology of Trust. In: Trust, Privacy and Security in Digital Business. Springer, Volume 3592\/2005, pp. 175\u2013184.","journal-title":"Trust, Privacy and Security in Digital Business"},{"key":"6_CR15","unstructured":"Puttini R S, M\u00e9 L, Sousa Jr R T (2004) On the Vulnerabilities and Protection of Mobile Ad Hoc Network Routing Protocols. In: Proceedings of the 3rd International Conference on Networking ICN\u20192004. IEEE, pp. 676\u2013684, New Jersey, USA."},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.tcs.2006.08.036","volume":"367","author":"S. Nanz","year":"2006","unstructured":"Nanz S, Hankin C (2006) A Framework for Security Analysis of Mobile Wireless Networks. Theoretical Computer Science, Volume 367, pp. 203\u2013227.","journal-title":"Theoretical Computer Science"},{"key":"6_CR17","unstructured":"Bussard L (2004) Trust Establishment Protocols for Communicating Devices, PhD Thesis, Eurecom \u2014 ENST."},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/321765.321768","volume":"20","author":"B. Johnson D","year":"1973","unstructured":"Johnson D B (1973) A Note on Dijkstra\u2019s Shortest Path Algorithm, Journal of the ACM, Volume 20, pp. 385\u2013388, New York, USA.","journal-title":"Journal of the ACM"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T14:18:22Z","timestamp":1580307502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387736549","9780387736556"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_6","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}