{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:13:47Z","timestamp":1725614027938},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642238802"},{"type":"electronic","value":"9783642238819"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23881-9_61","type":"book-chapter","created":{"date-parts":[[2011,9,24]],"date-time":"2011-09-24T04:51:47Z","timestamp":1316839907000},"page":"467-474","source":"Crossref","is-referenced-by-count":1,"title":["TD-Trust: A Time Domain Based P2P Trust Model"],"prefix":"10.1007","author":[{"given":"Dong","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhengtao","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Chunling","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"61_CR1","first-page":"101","volume-title":"IEEE International Conference on Peer-to-Peer Computing (P2P 2001)","author":"R. Schollmeier","year":"2001","unstructured":"Schollmeier, R.: A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: IEEE International Conference on Peer-to-Peer Computing (P2P 2001), pp. 101\u2013102. IEEE Press, Linkoping Sweden (2001)"},{"issue":"1","key":"61_CR2","first-page":"138","volume":"35","author":"J.-y. Chen","year":"2009","unstructured":"Chen, J.-y., Sun, J.-z., Zhang, Y.-p.: Aggregation-based Reputation Evaluation Algorithm for P2P E-commerce. Computer Engineering\u00a035(1), 138\u2013139 (2009)","journal-title":"Computer Engineering"},{"key":"61_CR3","first-page":"56","volume-title":"27th International Conference on Distributed Computing Systems","author":"Q. Lian","year":"2007","unstructured":"Lian, Q., Zhang, Z., Yang, M., Zhao, B.Y., Dai, Y., Li, X.: An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System. In: 27th International Conference on Distributed Computing Systems, pp. 56\u201356. IEEE Press, Toronto (2007)"},{"key":"61_CR4","volume-title":"2nd International Conference on Future Computer and Communication (ICFCC)","author":"F. Xue","year":"2010","unstructured":"Xue, F., Feng, G., Zhang, Y.: CommuTrust: A Trust and Secure Architecture in Community-based P2P Overlay Networks. In: 2nd International Conference on Future Computer and Communication (ICFCC), pp. V3-811\u2013V3-816. IEEE Press, Wuhan (2010)"},{"issue":"6","key":"61_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MDSO.2005.31","volume":"6","author":"D. Hughes","year":"2005","unstructured":"Hughes, D., Coulson, G., Walkerdine, J.: Free Riding on Gnutella Revisited: The Bell Tolls? IEEE Distributed System Online\u00a06(6), 1 (2005)","journal-title":"IEEE Distributed System Online"},{"issue":"10","key":"61_CR6","doi-asserted-by":"publisher","first-page":"2","DOI":"10.5210\/fm.v5i10.792","volume":"5","author":"E. Adar","year":"2000","unstructured":"Adar, E., Huberman, B.A.: Free riding on Gnutella. First Monday\u00a05(10), 2 (2000)","journal-title":"First Monday"},{"key":"61_CR7","first-page":"125","volume-title":"Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005","author":"M.J. Ham","year":"2005","unstructured":"Ham, M.J., Agha, G.: ARA: a robust audit to prevent free-riding in P2P networks. In: Fifth IEEE International Conference on Peer-to-Peer Computing, P2P 2005, pp. 125\u2013132. IEEE Press, Los Alamitos (2005)"},{"issue":"19","key":"61_CR8","first-page":"115","volume":"43","author":"F. Jia","year":"2007","unstructured":"Jia, F., Xie, D., Yang, Y.-x.: Trust model in time-domain for P2P networks. Computer Engineering and Applications\u00a043(19), 115\u2013117 (2007)","journal-title":"Computer Engineering and Applications"},{"key":"61_CR9","first-page":"235","volume-title":"Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009)","author":"Y. Zhang","year":"2009","unstructured":"Zhang, Y., Wang, K.W., Li, K., Qu, W.Y., Xiang, Y.: Time-decay based P2P Trust Model. In: Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009), pp. 235\u2013238. IEEE Press, Wuhan (2009)"},{"issue":"20","key":"61_CR10","first-page":"115","volume":"45","author":"H.-t. Yu","year":"2009","unstructured":"Yu, H.-t., Zhang, J.-h., Zhong, Z.: Trust model in P2P network based on time factor and punitive measures. Computer Engineering and Applications\u00a045(20), 115\u2013117 (2009)","journal-title":"Computer Engineering and Applications"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23881-9_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T14:00:28Z","timestamp":1539352828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23881-9_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642238802","9783642238819"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23881-9_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}