{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:36:40Z","timestamp":1742996200894,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540880103"},{"type":"electronic","value":"9783540880110"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88011-0_42","type":"book-chapter","created":{"date-parts":[[2008,9,20]],"date-time":"2008-09-20T07:34:05Z","timestamp":1221896045000},"page":"286-294","source":"Crossref","is-referenced-by-count":1,"title":["Cooperative Security Schemes for Mobile Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"P.","family":"Caballero-Gil","sequence":"first","affiliation":[]},{"given":"C.","family":"Hern\u00e1ndez-Goya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Basar, T.: A game theoretic analysis of intrusion detection in access control systems. In: Proc. of the 43rd IEEE Conference on Decision and Control, Paradise Island, Bahamas, pp. 1568\u20131573 (December 2004)","DOI":"10.1109\/CDC.2004.1430267"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.-Y.L.: Performance Analysis of the Confidant Protocol. In: Proc. of ACM MobiHoc (June 2002)","DOI":"10.1145\/513800.513828"},{"key":"42_CR3","unstructured":"Buttyan, L., Hubaux, J.P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM Mobile Networks and Applications\u00a08(5) (October 2003)"},{"key":"42_CR4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815102","volume-title":"Security and Cooperation in Wireless Networks","author":"L. Buttyan","year":"2007","unstructured":"Buttyan, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks. Cambridge Univ. Press, Cambridge (2007)"},{"issue":"5","key":"42_CR5","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TMC.2006.68","volume":"5","author":"L. Buttyan","year":"2006","unstructured":"Buttyan, L., Hubaux, J.-P., Felegyhazi, M.: Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. IEEE Transactions on Mobile Computing\u00a05(5), 463\u2013476 (2006)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume-title":"Mobile Computing","author":"D.B. Johnson","year":"1996","unstructured":"Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks. In: Mobile Computing, vol.\u00a0353, Ch. 5 , pp. 153\u2013181. Kluwer Academic Publishers, Dordrecht (1996)"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Liu, P., Zang, W.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. In: Proc. of the 10th ACM Computer and Communications Security Conference (CCS 2003), Washington, DC, pp. 179\u2013189 (October 2003)","DOI":"10.1145\/948109.948135"},{"key":"42_CR8","unstructured":"Lye, K.-W., Wing, J.: Game strategies in network security. In: Foundations of Computer Security Workshop in FLoC 2002, Copenhagen, Denmark (July 2002)"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Shastry, N., Adve, R.S.: Stimulating cooperative diversity in wireless ad hoc networks through pricing. In: IEEE Int. Conf. on Communications (June 2006)","DOI":"10.1109\/ICC.2006.255655"},{"key":"42_CR10","unstructured":"Srinivasan, V., Nuggehalli, P., Rao, R.R.: Cooperation in Ad Hoc Networks. In: Proc. of Infocom 2003, San Francisco, CA (2003)"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Yousefi, S., Mousavi, M.S., Fathy, M.: Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives. In: 6th Int. conference on ITS Telecommunications (ITST 2006), China (2006)","DOI":"10.1109\/ITST.2006.289012"},{"key":"42_CR12","unstructured":"Zhong, S., et al.: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. In: Proceedings of IEEE Infocom, San Francisco, CA, USA (2003)"}],"container-title":["Lecture Notes in Computer Science","Cooperative Design, Visualization, and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88011-0_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T04:04:56Z","timestamp":1714795496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-88011-0_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540880103","9783540880110"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88011-0_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}