{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:39:00Z","timestamp":1742402340088},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208303"},{"type":"electronic","value":"9783540398714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39871-4_6","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T19:33:06Z","timestamp":1277839986000},"page":"47-66","source":"Crossref","is-referenced-by-count":52,"title":["On Trust Establishment in Mobile Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Laurent","family":"Eschenauer","sequence":"first","affiliation":[]},{"given":"Virgil D.","family":"Gligor","sequence":"additional","affiliation":[]},{"given":"John","family":"Baras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Babaoglu, O., Meling, H., Montresor, A.: Anthill: A Framework for the Development of Agent-Based Peer-to-Peer System, Technical Report UBLCS-2001-09, University of Bologna, Italy"},{"key":"6_CR2","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Chi Wong, H.: Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In: Proc. of the ISOC 2002 Network and Distributed Systems Security Symposium (February 2002)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security - ESORICS 94","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875. Springer, Heidelberg (1994)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. of the 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust management for publickey infrastructures. In: Proc. Cambridge 1998 Security Protocols International Workshop, pp. 59\u201363 (1998)","DOI":"10.1007\/3-540-49135-X_9"},{"key":"6_CR6","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001","volume-title":"Swarm Intelligence: From Natural to Artificial Systems, Santa Fe Institute on the Sciences of Complexity","author":"E. Bonabeau","year":"1999","unstructured":"Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems, Santa Fe Institute on the Sciences of Complexity. Oxford University Press, Oxford (July 1999)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System. In: Proc. of the International Computer Science Institute (ICSI) Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA (2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"6_CR8","unstructured":"Common Criteria for Information Technology Security Evaluation \u2013 Part 3: Security Assurance Requirements, version 2.0, CCIB-98-028, National Institute of Standards and Technology (May 1998), http:\/\/niap.nist.gov"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Gligor, V.D., Luan, S.-W., Pato, J.N.: On inter-realm authentication in large distributed systems. In: Proc. of the 1992 IEEE Symposium on Research in Security and Privacy (May 1992)","DOI":"10.1109\/RISP.1992.213274"},{"key":"6_CR10","unstructured":"Gnutella, http:\/\/www.gnutellanews.com\/"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In: Proc. of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, pp. 2\u201314 (2000)","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Hubaux, J.-P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. of the ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC 2001 (2001)","DOI":"10.1145\/501416.501437"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-540-46588-1_8","volume-title":"Public Key Cryptography","author":"R. Kohlas","year":"2000","unstructured":"Kohlas, R., Maurer, U.: Confidence Valuation in a Public-key Infrastructure Based on Uncertain Evidence. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 93\u2013112. Springer, Heidelberg (2000)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: Proc. of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000) (November 2000)","DOI":"10.1145\/378993.379239"},{"issue":"4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B.W. Lampson","year":"1992","unstructured":"Lampson, B.W., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/3-540-61770-1_45","volume-title":"Computer Security - ESORICS 96","author":"U. Maurer","year":"1996","unstructured":"Maurer, U.: Modelling a Public-Key Infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 325\u2013350. Springer, Heidelberg (1996)"},{"key":"6_CR17","unstructured":"Napster, http:\/\/www.napster.com"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Reiter, M.K., Stubblebine, S.G.: Toward acceptable metrics of authentication. In: Proc. of the IEEE Conference on Security and Privacy, Oakland, CA (1997)","DOI":"10.1109\/SECPRI.1997.601308"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Reiter, M.K., Stubblebine, S.G.: Path independence for authentication in large-scale systems. In: Proc. of the 4th ACM Conference on Computer and Communications Security (April 1997)","DOI":"10.1145\/266420.266435"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","volume-title":"Proc. of the 8th International Workshop on Security Protocols","author":"F. Stajano","year":"1999","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Adhoc Wireless Networks. In: Proc. of the 8th International Workshop on Security Protocols. LNCS. Springer, Berlin (1999)"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"Proc. of the 8th International Workshop on Security Protocols","author":"F. Stajano","year":"2000","unstructured":"Stajano, F.: The resurrecting duckling \u2013 What next? In: Proc. of the 8th International Workshop on Security Protocols. LNCS. Springer, Berlin (April 2000)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for Internet applications. In: Proc. of the 2001 ACM SIGCOMM Conference, San Diego, CA, pp. 149\u2013160 (2001)","DOI":"10.1145\/383059.383071"},{"issue":"1","key":"6_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/174613.174614","volume":"12","author":"E. Wobber","year":"1994","unstructured":"Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the Taos operating system. ACM Transactions on Computer Systems\u00a012(1), 3\u201332 (1994)","journal-title":"ACM Transactions on Computer Systems"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems\u2014A distributed authentication perspective. In: Proc. of the 1993 IEEE Symposium on Research in Security and Privacy, May 1993, pp. 150\u2013164 (1993)","DOI":"10.1109\/RISP.1993.287635"},{"key":"6_CR25","volume-title":"The Official PGP User\u2019s Guide","author":"P.R. Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995), http:\/\/www-mitpress.mit.edu\/mitp\/recent-books\/comp\/pgp-user.html"},{"issue":"6","key":"6_CR26","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39871-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T10:08:06Z","timestamp":1635588486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39871-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208303","9783540398714"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39871-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}