{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:46:50Z","timestamp":1725565610966},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219590"},{"type":"electronic","value":"9783540246930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24693-0_35","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T02:02:45Z","timestamp":1284170565000},"page":"418-429","source":"Crossref","is-referenced-by-count":0,"title":["Fair Packet Forwarding in MANETs with Anonymous Stations: A Game-Theoretic Approach"],"prefix":"10.1007","author":[{"given":"Jerzy","family":"Konorski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1109\/TCOM.1984.1096165","volume":"32","author":"G\u0412 Agnew","year":"1984","unstructured":"Agnew, G. \u0412., Mark, J. W.: Performance Modeling for Communication Networks at a Switching Node. IEEE Trans. Comm. COM-32 (1984) 902\u2013910","journal-title":"IEEE Trans. Comm."},{"key":"35_CR2","series-title":"Tech. Rep. DSC\/2001\/001","volume-title":"Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organised Mobile Ad-Hoc Networks","author":"L Buttyan","year":"2001","unstructured":"Buttyan, L., Hubaux, J. P.: Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organised Mobile Ad-Hoc Networks. Tech. Rep. DSC\/2001\/001, Swiss Federal Institute of Technology (2001)"},{"key":"35_CR3","volume-title":"The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks","author":"J Broch","year":"1998","unstructured":"Broch, J., Johnson, D., Maltz, D.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. IETF Internet Draft (1998)"},{"key":"35_CR4","series-title":"Tech. Rep. IC\/2003\/33","volume-title":"Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks \u2014 The Static Case","author":"M Felegyhazi","year":"2003","unstructured":"Felegyhazi, M., Buttyan L., Hubaux, J. P.: Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks \u2014 The Static Case. Tech. Rep. IC\/2003\/33, Swiss Federal Institute of Technology (2003)"},{"key":"35_CR5","volume-title":"Game Theory","author":"D Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge Mass. (1991)"},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MWC.2002.1028874","volume":"4","author":"AJ Goldsmith","year":"2002","unstructured":"Goldsmith, A.J., Wicker, S.B.: Design Challenges for Energy-Constrained Ad Hoc Wireless Networks. IEEE Wireless Communications 4 (2002) 8\u201327","journal-title":"IEEE Wireless Communications"},{"key":"35_CR7","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TCOM.1981.1095012","volume":"29","author":"F Kamoun","year":"1981","unstructured":"Kamoun, F.: A Drop-and-Throttle Flow Control Policy for Computer Networks. IEEE Trans. Comm. COM-29 (1981) 444\u2013452","journal-title":"IEEE Trans. Comm."},{"key":"35_CR8","volume-title":"Fair Packet Forwarding in Mobile Ad Hoc Networks: A Game-Theoretic Approach","author":"J Konorski","year":"2004","unstructured":"Konorski, J., Fair Packet Forwarding in Mobile Ad Hoc Networks: A Game-Theoretic Approach. Tech. Rep., Gdansk Univ. Tech. (2004)"},{"key":"35_CR9","first-page":"255","volume-title":"Proc. 6th Annual Conf. on Mobile Computing and Networking MobiCom 2000","author":"S Marti","year":"2000","unstructured":"Marti, S., Giuli, T. J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. 6th Annual Conf. on Mobile Computing and Networking MobiCom 2000 (2000) 255\u2013265"},{"key":"35_CR10","series-title":"Res. Rep. RR-02\u2013069","volume-title":"Making Greed Work in Mobile Ad Hoc Networks","author":"P Michiardi","year":"2002","unstructured":"Michiardi, P., Molva, R.: Making Greed Work in Mobile Ad Hoc Networks. Res. Rep. RR-02\u2013069, Institut Eurecom, Sophia-Antipolis, France (2002)"},{"key":"35_CR11","series-title":"Tech. Rep. 2003\u20131, Univ. of Karlsruhe","volume-title":"Stimulating Cooperative Behaviour of Autonomous Devices \u2014 An Analysis of Requirements and Existing Approaches","author":"P Obreiter","year":"2003","unstructured":"Obreiter, P., Koenig-Ries, \u0412., Klein, M.: Stimulating Cooperative Behaviour of Autonomous Devices \u2014 An Analysis of Requirements and Existing Approaches. Tech. Rep. 2003\u20131, Univ. of Karlsruhe, Germany (2003)"},{"key":"35_CR12","volume-title":"Proc. IEEE INFOCOM 2003","author":"V Srinivasan","year":"2003","unstructured":"Srinivasan, V., Nuggehalli, P., Chiasserini, \u0421 F., Rao, R. R.: Cooperation in Wireless Ad Hoc Networks. In: Proc. IEEE INFOCOM 2003 (2003)"},{"key":"35_CR13","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"1999","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Englewood Cliffs NJ (1999)"},{"key":"35_CR14","volume-title":"Proc. WiOpt 2003 Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks","author":"A Urpi","year":"2003","unstructured":"Urpi, A., Bonuccelli, M., Giordano S.: Modelling Cooperation in Mobile Ad Hoc Networks: a Formal Description of Selfishness. In: Proc. WiOpt 2003 Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (2003)"},{"key":"35_CR15","volume-title":"Proc. IEEE INFOCOM 2003","author":"S Zhong","year":"2003","unstructured":"Zhong, S., Chen, J., Yang, Y. R.: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. In: Proc. IEEE INFOCOM 2003 (2003)"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24693-0_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:03:45Z","timestamp":1620011025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24693-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219590","9783540246930"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24693-0_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}