{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:25:44Z","timestamp":1737437144739,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540754435"},{"type":"electronic","value":"9783540754442"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75444-2_18","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T15:48:35Z","timestamp":1189180115000},"page":"132-143","source":"Crossref","is-referenced-by-count":1,"title":["Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Qiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guangming","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhenghu","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"18_CR1","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.comcom.2003.10.005","volume":"27","author":"V. Varadharajan","year":"2004","unstructured":"Varadharajan, V., Shankaran, R., Hitchens, M.: Security for Cluster Based Ad hoc Networks. Computer Communications\u00a027(5), 488\u2013501 (2004)","journal-title":"Computer Communications"},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/PROC.1987.13705","volume":"75","author":"A. Ephrem ides","year":"1987","unstructured":"Ephrem ides, A., Wieselth ier, J.E., Baker, D.J.: A design concept for reliable mobile radio networks with frequency hopping signaling[A]. Proceedings of IEEE[C]\u00a075(1), 56\u201373 (1987)","journal-title":"Proceedings of IEEE[C]"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/BF01200845","volume":"1","author":"M. Gerla","year":"1995","unstructured":"Gerla, M., sai, T., Multicluster, J.T.C.: mobile, multimedia radio network [J ]. Wireless Networks\u00a01, 255\u2013265 (1995)","journal-title":"Wireless Networks"},{"key":"18_CR4","unstructured":"Parekh, A.K.: Selecting Routers in Ad-Hoc Wireless Networks. In: Proceeding of the SBT\/IEEE International Tele. Symposium (1994)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Basagni, S.: Distributed clustering for ad hoc networks[C]. In: Proceedings of International Symposium on Parallel Architectures[C], Algorithms and Networks, pp. 310\u2013315 (1999)","DOI":"10.1109\/ISPAN.1999.778957"},{"key":"18_CR6","unstructured":"Chatterjee, M., Das, S.K., Turgut, D.: WCA: a weighted clustering algorithm for mobile Ad Hoc networks [J ]. Journal of Cluster computing, Special issue on Mobile Ad hoc Networking, 193\u2013204 (2002)"},{"key":"18_CR7","first-page":"1697","volume-title":"Proceedings of IEEE GLOBECOM 2000 [C]","author":"M. Chatterjee","year":"2000","unstructured":"Chatterjee, M., Das, S.K., Turgut, D.: An on-demand weighted clustering algorithm (WCA ) for ad hoc networks[A]. In: Proceedings of IEEE GLOBECOM 2000 [C], San Francisco, pp. 1697\u20131701. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Krishna, P., Vaidya, N.H., Chatterjee, M., et al.: A cluster based approach for routing in Ad Hoc networks[J ]. ACM SIGCOMM Computer Communication Review (CCR) (1997)","DOI":"10.1145\/263876.263885"},{"key":"18_CR9","unstructured":"Amis, A.D., Prakash, R., Vuong, T.H., Huynh, D.T.: Max-M in D-Cluster formation in wireless Ad Hoc networks [C]. In: Proceedings IEEE INFOCOM 2000, Israel (2000)"},{"key":"18_CR10","first-page":"413","volume-title":"Proceedings of IEEE ICDCS 2001 Workshop on Wireless Networks and Mobile computing, Phoenix, A Z","author":"P. Basu","year":"2001","unstructured":"Basu, P., Khan, N., Little, T.D.C.: Amobility based metric for clustering in mobile Ad Hoc networks [C]. In: Proceedings of IEEE ICDCS 2001 Workshop on Wireless Networks and Mobile computing, Phoenix, A Z, pp. 413\u2013418. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Li, D., Gong, Z., et al.: EDDTSTM: A Time-Nonlinear-Sensitive Trust Model Based on Human Mental Peculiarity in Virtual Computing Environments. Guangzhou, China. In: Proceeding of CIS. vol. 1, pp. 62\u201367 (2006)","DOI":"10.1109\/ICCIAS.2006.294091"},{"key":"18_CR12","unstructured":"Kuang, X.-H.: Research of Group Key Management in Mobile Ad hoc Networks. PhD thesis, National University of Defense Technology, Changsha, Hunan, P.R. China (2003)"},{"key":"18_CR13","unstructured":"Hu, G.-M.: Research on Key Security Issues in Clustered Mobile Ad hoc Networks. PhD thesis, National University of Defense Technology, Changsha, Hunan, P.R. China (2007)"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75444-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T21:45:44Z","timestamp":1737409544000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75444-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540754435","9783540754442"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75444-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}