{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:16:26Z","timestamp":1759637786507,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642052835"},{"type":"electronic","value":"9783642052842"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05284-2_12","type":"book-chapter","created":{"date-parts":[[2009,10,13]],"date-time":"2009-10-13T12:06:00Z","timestamp":1255435560000},"page":"207-227","source":"Crossref","is-referenced-by-count":5,"title":["Dealing with Liars: Misbehavior Identification via R\u00e9nyi-Ulam Games"],"prefix":"10.1007","author":[{"suffix":"Jr.","given":"William","family":"Kozma","sequence":"first","affiliation":[]},{"given":"Loukas","family":"Lazos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Awerbuch, B., Holmer, D., Rotaru, C.-N., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: WiSe 2002 (2002)","DOI":"10.1145\/570681.570684"},{"key":"12_CR2","unstructured":"Balakrishnan, K., Deng, J., Varshney, P.K.: Twoack: Preventing selfishness in mobile ad hoc networks. In: WCNC 2005 (2005)"},{"key":"12_CR3","volume-title":"Error Correcting Codes","author":"E. Berlekamp","year":"1968","unstructured":"Berlekamp, E.: Error Correcting Codes. Wiley, NY (1968)"},{"issue":"7","key":"12_CR4","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A. Broder","year":"2004","unstructured":"Broder, A., Mitzenmacher, M.: Network applications of bloom filters: A survey. Internet Mathematics\u00a01(4), 485\u2013509 (2004)","journal-title":"Internet Mathematics"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In: MobiHOC 2002 (2002)","DOI":"10.1145\/513800.513828"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.-Y.L.: Self-policing mobile ad-hoc networks by reputation systems. IEEE Communications Magazine, 101\u2013107 (2005)","DOI":"10.1109\/MCOM.2005.1470831"},{"key":"12_CR8","unstructured":"Buttyan, L., Hubaux, J.-P.: Enforcing service availability in mobile ad-hoc wans. In: MobiHOC 2000, pp. 87\u201396 (2000)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Buttyan, L., Hubaux, J.-P.: Stimulating cooperation in self-organizing mobile ad hoc networks. ACM\/Kluwer Mobile Networks and Applications\u00a08(5) (2003)","DOI":"10.1023\/A:1025146013151"},{"key":"12_CR10","unstructured":"Dhagat, A., G\u00e1cs, P., Winkler, P.: On playing \u201ctwenty questions\u201d with a liar. In: SODA 1992, pp. 16\u201322. Society for Industrial and Applied Mathematics (1992)"},{"key":"12_CR11","unstructured":"Dong, Y., Go, H., Sui, A., Li, V., Hui, L., Yiu, S.: Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks. In: SecureComm 2005 (2005)"},{"key":"12_CR12","unstructured":"Feeney, L.M., Nilsson, M.: Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: INFOCOM 2001 (2001)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. In: SASN 2004, pp. 66\u201377 (2004)","DOI":"10.1145\/1029102.1029115"},{"key":"12_CR14","unstructured":"He, Q., Wu, D., Khosla, P.: Sori: A secure and objective reputation-based incentive scheme for ad hoc networks. In: WCNC 2004 (2004)"},{"issue":"1","key":"12_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"Y. Hu","year":"2003","unstructured":"Hu, Y., Johnson, D., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks\u00a01(1), 175\u2013192 (2003)","journal-title":"Ad Hoc Networks"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Hubaux, J.-P., Buttyan, L.: A micropayment scheme encouraging collaboration in multi-hop cellular networks. In: Proc. of Financial Crypto (2003)","DOI":"10.1007\/978-3-540-45126-6_2"},{"key":"12_CR17","unstructured":"Johnson, D., Maltz, D., Hu, Y.-C.: The dynamic source routing protocol for mobile ad hoc networks (dsr). draft-ietf-manet-dsr-09.txt (2003)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Kozma Jr., W., Lazos, L.: REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. In: WiSec 2009 (2009)","DOI":"10.1145\/1514274.1514290"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN 2008 (2008)","DOI":"10.1109\/IPSN.2008.47"},{"issue":"5","key":"12_CR20","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/TMC.2007.1036","volume":"6","author":"K. Liu","year":"2006","unstructured":"Liu, K., Deng, J., Varshney, P., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computing\u00a06(5), 536\u2013550 (2006)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: CMS 2002 (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Padmanabhan, V.-N., Simon, D.-R.: Secure traceroute to detect faulty or malicious routing. SIGCOMM Computer Communication Review\u00a033(1) (2003)","DOI":"10.1145\/774763.774775"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp. 1\u201327 (2002)","DOI":"10.1201\/9781420040401.ch31"},{"issue":"1","key":"12_CR25","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/0097-3165(89)90075-7","volume":"51","author":"A. Pelc","year":"1989","unstructured":"Pelc, A.: Detecting errors in searching games. Journal of Combinatorial Theory Series A\u00a051(1), 43\u201354 (1989)","journal-title":"Journal of Combinatorial Theory Series A"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Perkins, C., Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing (2003)","DOI":"10.17487\/rfc3561"},{"issue":"5","key":"12_CR27","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/ICHIT.2006.253522","volume-title":"Proceedings of the 2006 International Conference on Hybrid Information Technology","author":"S. Raghani","year":"2006","unstructured":"Raghani, S., Toshniwal, D., Joshi, R.: Dynamic Support for Distributed Certification Authority in Mobile Ad Hoc Networks. In: Proceedings of the 2006 International Conference on Hybrid Information Technology, vol.\u00a01, pp. 424\u2013432. IEEE Computer Society, Washington (2006)"},{"key":"12_CR29","volume-title":"A Diary on Information Theory","author":"A. R\u00e9nyi","year":"1984","unstructured":"R\u00e9nyi, A.: A Diary on Information Theory. Wiley, New York (1984)"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/0022-0000(80)90014-8","volume":"20","author":"R. Rivest","year":"1980","unstructured":"Rivest, R., Meyer, A., Kleitman, D., Winklmann, K., Spencer, J.: Coping with errors in binary search procedures. J. Comput. System Sci.\u00a020, 396\u2013404 (1980)","journal-title":"J. Comput. System Sci."},{"key":"12_CR31","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1017\/S0963548300000080","volume":"1","author":"J. Spencer","year":"1992","unstructured":"Spencer, J., Winkler, P.: Three thresholds for a liar. Combinatorics, Probability and Computing\u00a01, 81\u201393 (1992)","journal-title":"Combinatorics, Probability and Computing"},{"key":"12_CR32","volume-title":"Adventures of a Mathematician","author":"S. Ulam","year":"1976","unstructured":"Ulam, S.: Adventures of a Mathematician. Scribner, New York (1976)"},{"key":"12_CR33","unstructured":"Yi, S., Kravets, R.: MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. In: 2nd Annual PKI Research Workshop Pre-Proceedings, vol.\u00a051"},{"key":"12_CR34","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM 2003 (2003)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05284-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T05:50:11Z","timestamp":1634017811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05284-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642052835","9783642052842"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05284-2_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}