{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:20:57Z","timestamp":1743006057541,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642152900"},{"type":"electronic","value":"9783642152917"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15291-7_43","type":"book-chapter","created":{"date-parts":[[2010,8,30]],"date-time":"2010-08-30T15:56:39Z","timestamp":1283183799000},"page":"454-465","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Huanyu","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Xin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.Y.L.: A robust reputation system for mobile ad-hoc networks. Technical report, IC\/2003\/50, EPFL-IC-LCA (2003)","DOI":"10.1201\/9780203504086.ch20"},{"issue":"7","key":"43_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MCOM.2005.1470831","volume":"43","author":"S. Buchegger","year":"2005","unstructured":"Buchegger, S., Boudee, J.Y.L.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine\u00a043(7), 101\u2013107 (2005)","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"43_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1362542.1362546","volume":"4","author":"S. Ganeriwal","year":"2008","unstructured":"Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sen. Netw.\u00a04(3), 1\u201337 (2008)","journal-title":"ACM Trans. Sen. Netw."},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., G.-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web (WWW). pp. 640\u2013651. Budapest,Hungary (May 20-24 2003)","DOI":"10.1145\/775152.775242"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Liu, C., Wu, J.: Routing in a cyclic mobispace. In: MobiHoc: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, pp. 351\u2013360 (2008)","DOI":"10.1145\/1374618.1374665"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Srinivasan, V., Motani, M., Ooi, W.T.: Analysis and implications of student contact patterns derived from campus schedules. In: MobiCom 2006: Proceedings of the 12th annual international conference on Mobile computing and networking, New York, NY, USA, pp. 86\u201397 (2006)","DOI":"10.1145\/1161089.1161100"},{"key":"43_CR8","unstructured":"Srinivasan, V., Motani, M., Ooi, W.T.: CRAWDAD data set nus\/contact, v. 2006-08-01 (August 2006), \n                    \n                      http:\/\/crawdad.cs.dartmouth.edu\/nus\/contact"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications\u00a024(2) (2006)","DOI":"10.1109\/JSAC.2005.861389"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Baras, J.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications\u00a024(2) (February 2006)","DOI":"10.1109\/JSAC.2005.861390"},{"issue":"7","key":"43_CR11","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"43_CR12","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/s11390-009-9275-7","volume":"24","author":"H. Zhao","year":"2009","unstructured":"Zhao, H., Li, X.: H-trust: A robust and lightweight group reputation system for peer-to-peer desktop grid. Journal of Computer Science and Technology (JCST)\u00a024(5), 833\u2013843 (2009)","journal-title":"Journal of Computer Science and Technology (JCST)"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Zhao, H., Li, X.: Vectortrust: The trust vector aggregation scheme for trust management in peer-to-peer networks. In: The 18th International Conference on Computer Communications and Networks (ICCCN 2009), San Francisco, CA USA, August 2-6 (2009)","DOI":"10.1109\/ICCCN.2009.5235290"},{"issue":"4","key":"43_CR14","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R. Zhou","year":"2007","unstructured":"Zhou, R., Hwang, K.: Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems\u00a018(4), 460\u2013473 (2007)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2010 - Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15291-7_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T14:30:46Z","timestamp":1589898646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15291-7_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152900","9783642152917"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15291-7_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}