{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:06:15Z","timestamp":1725534375722},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642024566"},{"type":"electronic","value":"9783642024573"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02457-3_30","type":"book-chapter","created":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T13:54:56Z","timestamp":1246974896000},"page":"345-360","source":"Crossref","is-referenced-by-count":1,"title":["Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Seong-Soo","family":"Park","sequence":"first","affiliation":[]},{"given":"Jong-Hyouk","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Tai-Myoung","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"30_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MIC.2005.128","volume":"9","author":"S.W. Shieh","year":"2005","unstructured":"Shieh, S.W., Wallach, D.S.: Guest Editors\u2019 Introduction: Ad Hoc and P2P Security. IEEE Internet Computing\u00a09(6), 14\u201315 (2005)","journal-title":"IEEE Internet Computing"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/3-540-46145-0_10","volume-title":"Data Warehousing and Knowledge Discovery","author":"Y. Zhong","year":"2002","unstructured":"Zhong, Y., Bhargava, B.: Authorization based on evidence and trust. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol.\u00a02454, pp. 94\u2013103. Springer, Heidelberg (2002)"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/11429760_8","volume-title":"Trust Management","author":"D.W. Chadwick","year":"2005","unstructured":"Chadwick, D.W.: Operational Models for Reputation Servers. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 108\u2013115. Springer, Heidelberg (2005)"},{"issue":"2","key":"30_CR4","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G. Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 318\u2013328 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Ngai, E.C.H., Lyu, M.R.: An authentication service based on trust and clustering in wireless ad hoc networks: description and security evaluation. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 1st edn. (2006)","DOI":"10.1109\/SUTC.2006.1636164"},{"issue":"2","key":"30_CR6","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. Josang","year":"2007","unstructured":"Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"30_CR7","unstructured":"Gambetta, D.G.: Can we trust trust? In: Gambetta, D.G. (ed.), ch.\u00a013, pp. 213\u2013237. Basil Blackwell, New York (1988)"},{"key":"30_CR8","unstructured":"McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04. University of Minnesota, Management Information Systems Reseach Center (1996)"},{"issue":"2","key":"30_CR9","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y.L. Sun","year":"2006","unstructured":"Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 305\u2013317 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"30_CR10","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MCOM.2008.4473092","volume":"46","author":"Y.L. Sun","year":"2008","unstructured":"Sun, Y.L., Han, Z., Liu, K.J.R.: Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine\u00a046(2), 112\u2013119 (2008)","journal-title":"IEEE Communications Magazine"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Amis, A.D., Prakash, R., Vuong, T.H.P., Huynh, D.T.: Max-min D-cluster Formation in Wireless Ad Hoc Network. In: Proc. of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (Infocom 2000), pp. 32\u201341 (March 2000)","DOI":"10.1109\/INFCOM.2000.832171"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Jin, S.-H., Park, C.-I., Choi, D.-S., Chung, K.-I., Yoon, H.-S.: Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network. ETRI Journal\u00a027(4) (2005)","DOI":"10.4218\/etrij.05.0204.0072"},{"key":"30_CR13","unstructured":"Massa, P.: Trust-aware Decentralized Recommender Systems: PhD research proposal. Technical Report No.T04-06-07, Istituto Trentino di Cultura (2004)"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Schein, A.I., Popescul, A., Ungar, L.H., Pennock, D.M.: Methods and Metrics for Cold-Start Recommendations. In: ACM SIGIR 2002, Finland (August 2002)","DOI":"10.1145\/564376.564421"},{"issue":"6","key":"30_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S. Song","year":"2005","unstructured":"Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing\u00a09(6), 24\u201334 (2005)","journal-title":"IEEE Internet Computing"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Park, S.-S., Lee, J.-H., Chung, T.-M.: Cluster-Based Trust Model against Attacks in Ad-Hoc Networks. In: 2008 Third International Conference on Convergence and Hybrid Information Technology, iccit, vol.\u00a01, pp. 526\u2013532 (2008)","DOI":"10.1109\/ICCIT.2008.112"},{"key":"30_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-540-30141-7_6","volume-title":"Network and Parallel Computing","author":"S. Song","year":"2004","unstructured":"Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Compuing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol.\u00a03222, pp. 9\u201321. Springer, Heidelberg (2004)"},{"key":"30_CR18","unstructured":"Fuzzy Logic Toolbox User\u2019s guide, The MathWorks, Inc. (2001), http:\/\/vyuka.fel.zcu.cz\/kae\/anf\/fuzzy_tb.pdf"},{"key":"30_CR19","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1145\/775152.775242","volume-title":"Proc. ACM Conference World Wide Web (WWW 2003)","author":"S. Kamvar","year":"2003","unstructured":"Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. ACM Conference World Wide Web (WWW 2003), pp. 640\u2013651. ACM Press, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02457-3_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T06:30:20Z","timestamp":1633674620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02457-3_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024566","9783642024573"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02457-3_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}