{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:12:40Z","timestamp":1763457160748,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540852568"},{"type":"electronic","value":"9783540852575"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85257-5_11","type":"book-chapter","created":{"date-parts":[[2008,9,6]],"date-time":"2008-09-06T13:31:54Z","timestamp":1220707914000},"page":"105-114","source":"Crossref","is-referenced-by-count":12,"title":["A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Nathan","family":"Griffiths","sequence":"first","affiliation":[]},{"given":"Arshad","family":"Jhumka","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Myers","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: Proceedings of the 1st ACM workshop on Wireless security, pp. 21\u201330 (2002)","DOI":"10.1145\/570681.570684"},{"key":"11_CR2","first-page":"213","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"D. Gambetta","year":"1988","unstructured":"Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213\u2013237. Basil Blackwell, Malden (1988)"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"T.D. Huynh","year":"2006","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems\u00a013(2), 119\u2013154 (2006)","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"issue":"2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"11_CR5","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling (1994)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Perkins, C., Royer, E.M., Das, S.: Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561 (2003)","DOI":"10.17487\/rfc3561"},{"issue":"1\u20132","key":"11_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11277-006-1574-5","volume":"37","author":"A.A. Pirzada","year":"2006","unstructured":"Pirzada, A.A., McDonald, C.: Trust establishment in pure ad-hoc networks. Wireless Personal Communications\u00a037(1\u20132), 139\u2013168 (2006)","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"11_CR8","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TMC.2006.83","volume":"5","author":"A.A. Pirzada","year":"2006","unstructured":"Pirzada, A.A., McDonald, C., Datta, A.: Performance comparison of trust-based reactive routing protocols. IEEE Trans. on Mobile Computing\u00a05(6), 695\u2013710 (2006)","journal-title":"IEEE Trans. on Mobile Computing"},{"issue":"1","key":"11_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"S.D. Ramchurn","year":"2004","unstructured":"Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. Knowledge Engineering Review\u00a019(1), 1\u201325 (2004)","journal-title":"Knowledge Engineering Review"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: Proceedings of the 1st Int. Conf. on Autonomous Agents in Multi-Agent Systems, pp. 475\u2013482 (2002)","DOI":"10.1145\/544741.544854"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE Int. Conf. on Network Protocols, pp. 78\u201389 (2002)","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Sel\u00e7uk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for P2P networks. In: IEEE\/ACM Int. Symposium on Cluster Computing and the Grid, pp. 251\u2013258 (2004)","DOI":"10.1109\/CCGrid.2004.1336575"},{"issue":"6","key":"11_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S. Song","year":"2005","unstructured":"Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing\u00a09(6), 24\u201334 (2005)","journal-title":"IEEE Internet Computing"},{"issue":"7","key":"11_CR14","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Trans. on Knowledge and Data Engineering\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"issue":"6","key":"11_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.J.: Securing ad-hoc networks. IEEE Network Magazine\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network Magazine"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing, Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85257-5_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T21:14:50Z","timestamp":1738358090000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85257-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540852568","9783540852575"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85257-5_11","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}