{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:43:03Z","timestamp":1725914583388},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_33","type":"book-chapter","created":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:08:03Z","timestamp":1509311283000},"page":"385-397","source":"Crossref","is-referenced-by-count":0,"title":["A Credibility Evaluation Method in Opportunistic Networks"],"prefix":"10.1007","author":[{"given":"Jinxia","family":"Dou","sequence":"first","affiliation":[]},{"given":"Wenbin","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Dongbin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"issue":"1","key":"33_CR1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.3724\/SP.J.1001.2009.00124","volume":"20","author":"YP Xiong","year":"2009","unstructured":"Xiong, Y.P., Sun, L.M., et al.: Opportunistic networks. J. Softw. 20(1), 124\u2013137 (2009)","journal-title":"J. Softw."},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Huang, C.M., Lan, K.C., et al.: A survey of opportunistic networks. In: International Conference on Advanced Information Networking and Applications, pp. 1672\u20131677. IEEE (2008)","DOI":"10.1109\/WAINA.2008.292"},{"issue":"1","key":"33_CR3","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/TNET.2007.897964","volume":"16","author":"T Spyropoulos","year":"2008","unstructured":"Spyropoulos, T., et al.: Efficient routing in intermittently connected mobile networks. IEEE\/ACM Trans. Netw. 16(1), 77\u201390 (2008)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"1","key":"33_CR4","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1016\/j.adhoc.2011.07.007","volume":"10","author":"Q Li","year":"2012","unstructured":"Li, Q., et al.: A routing protocol for socially selfish delay tolerant networks. Ad Hoc Netw. 10(1), 1619\u20131632 (2012)","journal-title":"Ad Hoc Netw."},{"key":"33_CR5","doi-asserted-by":"crossref","first-page":"2107","DOI":"10.1016\/j.jss.2011.05.043","volume":"84","author":"B Wang","year":"2011","unstructured":"Wang, B., et al.: Trust-based minimum cost opportunistic routing for Ad hoc networks. J. Syst. Softw. 84, 2107\u20132122 (2011)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"33_CR6","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSP.2004.1","volume":"2","author":"Y Hu","year":"2004","unstructured":"Hu, Y., Perrig, A.: A survey of secure wireless Ad hoc routing. IEEE Secur. Priv. 2(3), 28\u201339 (2004)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"33_CR7","first-page":"278","volume":"50","author":"Y Wu","year":"2013","unstructured":"Wu, Y., Li, J.H., et al.: Survey of security and trust in opportunistic networks. J. Comput. Res. Dev. 50(2), 278\u2013290 (2013)","journal-title":"J. Comput. Res. Dev."},{"issue":"1","key":"33_CR8","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MC.2010.19","volume":"43","author":"M Conti","year":"2010","unstructured":"Conti, M., Kumar, M.: Opportunities in opportunistic computing. Computer 43(1), 42\u201350 (2010)","journal-title":"Computer"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Trifunovic, S., Legendre, F., et al.: Social trust in opportunistic networks. In: INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/INFCOMW.2010.5466696"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Mtibaa, A., Harras, K.A.: Social-based trust in mobile opportunistic networks. In: Proceedings of IEEE Simna (2011)","DOI":"10.1109\/ICCCN.2011.6006047"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Becker, C., Schlinga, S., et al.: Trustful data forwarding in social opportunistic networks. In: 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing, and 10th International Conference on Autonomic and Trusted Computing (UIC\/ATC), pp. 430\u2013437. IEEE (2013)","DOI":"10.1109\/UIC-ATC.2013.37"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Bigwood, G., Henderson, T.: IRONMAN: using social networks to add incentives and reputation to opportunistic networks. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2011 IEEE Third International Conference on Social Computing (Social Com), pp. 65\u201372. IEEE (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.60"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Gupta, S., Dhurandher, S.K., et al.: Trust-based security protocol against black hole attacks in opportunistic networks. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 724\u2013729. IEEE, Lyon (2013)","DOI":"10.1109\/WiMOB.2013.6673436"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Premalatha, S., Mary Anita Rajam, V.: Reputation management for data forwarding in opportunistic networks. In: 2014 International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20137. IEEE, Coimbatore (2014)","DOI":"10.1109\/ICCCI.2014.6921822"},{"key":"33_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1080\/07360932.2013.781517","volume":"44","author":"S Grabner-Kr\u00e4uter","year":"2013","unstructured":"Grabner-Kr\u00e4uter, S., Bitter, S.: Trust in online social networks: a multifaceted perspective. Forum Soc. Econ. 44, 48\u201368 (2013). doi: 10.1080\/07360932.2013.781517","journal-title":"Forum Soc. Econ."},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/TNNLS.2016.2527796","volume":"28","author":"B Gu","year":"2017","unstructured":"Gu, B., Sheng, V.S.: A robust regularization path algorithm for \u03bd-support vector classification. IEEE Trans. Neural Netw. Learn. Syst. 28, 1241\u20131248 (2017). doi: 10.1109\/TNNLS.2016.2527796","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"33_CR17","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594\u20132608 (2016). doi: 10.1109\/TIFS.2016.2590944","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"33_CR18","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546\u20132559 (2016). doi: 10.1109\/TPDS.2015.2506573","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"33_CR19","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26, 1403\u20131416 (2015). doi: 10.1109\/TNNLS.2014.2342533","journal-title":"IEEE Trans. Neural Netw. Learn. Syst.."},{"key":"33_CR20","doi-asserted-by":"publisher","unstructured":"Chen, Y., Hao, C., Wu, W., Wu, E.: Robust dense reconstruction by range merging based on confidence estimation. Sci. China Inf. Sci. 59 (2016). doi: 10.1007\/s11432-015-0957-4","DOI":"10.1007\/s11432-015-0957-4"},{"key":"33_CR21","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.knosys.2016.10.016","volume":"115","author":"Y Kong","year":"2017","unstructured":"Kong, Y., Zhang, M., Ye, D.: A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl. Based Syst. 115, 123\u2013132 (2017). doi: 10.1016\/j.knosys.2016.10.016","journal-title":"Knowl. Based Syst."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T05:14:24Z","timestamp":1570252464000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}