{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:49:41Z","timestamp":1763534981619,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540921561"},{"type":"electronic","value":"9783540921578"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92157-8_5","type":"book-chapter","created":{"date-parts":[[2008,11,28]],"date-time":"2008-11-28T21:54:09Z","timestamp":1227909249000},"page":"47-58","source":"Crossref","is-referenced-by-count":2,"title":["Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory"],"prefix":"10.1007","author":[{"given":"Nouha","family":"Oualha","sequence":"first","affiliation":[]},{"given":"Yves","family":"Roudier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Friedman, D.: On economic applications of evolutionary game theory. Journal of Evolutionary Economics\u00a08, 15\u201343","DOI":"10.1007\/s001910050054"},{"issue":"2","key":"5_CR2","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.jtbi.2005.08.045","volume":"239","author":"H. Brandt","year":"2006","unstructured":"Brandt, H., Sigmund, K.: The good, the bad and the discriminator\u2013errors in direct and indirect reciprocity. Journal of Theoretical Biology\u00a0239(2), 183\u2013194 (2006)","journal-title":"Journal of Theoretical Biology"},{"key":"5_CR3","unstructured":"Oualha, N., \u00d6nen, M., Roudier, Y.: A Security Protocol for Self-Organizing Data Storage. In: Proceedings of 23rd International Information Security Conference (SEC 2008) IFIP Sec 2008, Milan, Italy (September 2008)"},{"key":"5_CR4","unstructured":"Oualha, N., \u00d6nen, M., Roudier, Y.: A Security Protocol for Self-Organizing Data Storage (extended version) Technical Report N\u00ba RR-08-208, EURECOM (January 2008)"},{"key":"5_CR5","unstructured":"Oualha, N., Roudier, Y.: Securing ad hoc storage through probabilistic cooperation assessment. In: WCAN 2007, 3rd Workshop on Cryptography for Ad hoc Networks, Wroclaw, Poland, July 8 (2007)"},{"key":"5_CR6","first-page":"598","volume-title":"CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security","author":"G. Ateniese","year":"2007","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 598\u2013609. ACM, New York (2007)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski, B.S.: PORs: Proofs of retrievability for large files., Cryptology ePrint archive, Report 2007\/243 (June 2007)","DOI":"10.1145\/1315245.1315317"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Deswarte, Y., Quisquater, J.-J., Sa\u00efdane, A.: Remote Integrity Checking. In: Proceedings of Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) (2004)","DOI":"10.1007\/1-4020-7901-X_1"},{"key":"5_CR9","unstructured":"Filho, D.G., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. In: IACR Cryptology ePrint Archive (2006)"},{"key":"5_CR10","unstructured":"Sebe, F., Domingo-Ferrer, J., Mart\u00ednez-Ballest\u00e9, A., Deswarte, Y., Quisquater, J.-J.: Efficient Remote Data Possession Checking in Critical Information Infrastructures. In: IEEE Transactions on Knowledge and Data Engineering, August 06, 2007, IEEE Computer Society Digital Library. IEEE Computer Society (December 6, 2007), http:\/\/doi.ieeecomputersociety.org\/10.1109\/TKDE.2007.190647"},{"key":"5_CR11","unstructured":"Schwarz, T., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of the IEEE Int\u2019l Conference on Distributed Computing Systems (ICDCS 2006) (July 2006)"},{"key":"5_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-5970-8","volume-title":"Differential Equations and Mathematical Biology","author":"D.S. Jones","year":"1983","unstructured":"Jones, D.S., Sleeman, B.D.: Differential Equations and Mathematical Biology. Allen & Unwin, London (1983)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Oualha, N., Roudier, Y.: Reputation and Audits for Self-Organizing Storage. In: Workshop on Security in Opportunistic and SOCial Networks SOSOC 2008, Turkey, Istanbul (September 2008)","DOI":"10.1145\/1461469.1461472"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Oualha, N., Michiardi, P., Roudier, Y.: A game theoretic model of a protocol for data possession verification. In: IEEE International Workshop on Trust, Security, and Privacy for Ubiquitous Computing TSPUC 2007, Helsinki, Finland, June 18 (2007)","DOI":"10.1109\/WOWMOM.2007.4351805"}],"container-title":["Lecture Notes in Computer Science","Self-Organizing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92157-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T17:10:17Z","timestamp":1557940217000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92157-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540921561","9783540921578"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92157-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}