{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T10:40:24Z","timestamp":1742553624340,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642280726"},{"type":"electronic","value":"9783642280733"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28073-3_18","type":"book-chapter","created":{"date-parts":[[2012,2,21]],"date-time":"2012-02-21T06:11:19Z","timestamp":1329804679000},"page":"200-211","source":"Crossref","is-referenced-by-count":0,"title":["Packet Forwarding Strategies for Cooperation Enforcement in Mobile Ad Hoc Wireless Networks"],"prefix":"10.1007","author":[{"given":"Nidhi","family":"Patel","sequence":"first","affiliation":[]},{"given":"Sanjay","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Axerod, R.: The evolution of Cooperation, revised edn. (2006)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"C. From. Accepted From Open Call Why Does It Pay To Be Selfish in A MANET? IEEE Wireless Communications, 87\u201397 (2006)","DOI":"10.1109\/MWC.2006.275203"},{"key":"18_CR3","unstructured":"Bandyopadhyay, S., W.L.: A Game-Theoretic Analysis on the Conditions of Cooperation in a Wireless Ad Hoc Network Electrical and Computer Engineering. Information Sciences"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of ACM\/IEEE International Conference on Mobile Computing and Networking (Mobicom 2000), pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"18_CR5","unstructured":"Srinivasan, V., Nuggehalli, P., Chiasserini, C.F., Rao, R.R.: Cooperation in Wireless Ad Hoc Networks. In: Proceedings of IEEE INFOCOM 2003, San Francisco, March 30-April 3 (2003)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Srinivasan, V., Nuggehalli, P., Chiasserini, C., Rao, R.R.: An Analytical Approach to the Study of Cooperation in Wireless Ad Hoc Networks, vol.\u00a04, pp. 722\u2013733 (2005)","DOI":"10.1109\/TWC.2004.842950"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes-Fairness In Dynamic Ad-hoc NeTworks). In: Proc. 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland, June 9-11, pp. 80\u201391 (2002)","DOI":"10.1145\/513800.513828"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: Core: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: Communication and Multimedia Security 2002, Portoroz, Slovenia, September 26-27 (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Zhong, S., Yang, Y.R., Chen, J.: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks. In: Proceedings of IEEE INFOCOM 2003, San Francisco, March 30-April 3 (2003)","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"18_CR10","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM\/Kluwer Mobile Networks and Applications (MONET) Special Issue on Mobile Ad Hoc Networks 8(5) (October 2003)"},{"key":"18_CR11","unstructured":"Seredynski, M., Bouvry, P.: Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model. Evaluation"},{"key":"18_CR12","unstructured":"Seredynski, M., Bouvry, P.: Evolutionary Game Theoretical Analysis of Reputation-based Packet Forwarding in Civilian Mobile Ad Hoc Networks. Technology"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Crosby, G.V., Pissinou, N.: Evolution of Cooperation in Multi-Class Wireless Sensor Networks (2007)","DOI":"10.1109\/LCN.2007.149"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1007\/978-3-540-39867-7_70","volume-title":"Personal Wireless Communications","author":"M. F\u00e9legyh\u00e1zi","year":"2003","unstructured":"F\u00e9legyh\u00e1zi, M., Butty\u00e1n, L., Hubaux, J.-P.: Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks \u2013 The Static Case. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol.\u00a02775, pp. 776\u2013789. Springer, Heidelberg (2003)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1007\/978-3-540-39867-7_70","volume-title":"Personal Wireless Communications","author":"M. F\u00e9legyh\u00e1zi","year":"2003","unstructured":"F\u00e9legyh\u00e1zi, M., Butty\u00e1n, L., Hubaux, J.-P.: Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - the Static Case. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol.\u00a02775, pp. 776\u2013789. Springer, Heidelberg (2003), http:\/\/lcawww.epfl.ch\/felegyhazi\/"},{"key":"18_CR16","unstructured":"Member, S., Hubaux, J., Member, S.: Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. IEEE Transactions On Mobile Computing (2004)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-540-45126-6_2","volume-title":"Financial Cryptography","author":"M. Jakobsson","year":"2003","unstructured":"Jakobsson, M., Hubaux, J.-P., Butty\u00e1n, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 15\u201333. Springer, Heidelberg (2003)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Ben Salem, N., Butty\u00e1n, L., Hubaux, J.P., Jakobsson, M.: A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks. In: Proc. 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2003), Annapolis, USA, June 1-3 (2003)","DOI":"10.1145\/778416.778418"},{"key":"18_CR19","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Enforcing Service Availability in Mobile Ad Hoc WANs. In: Proc. 1st ACM\/IEEE International Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc 2000), Boston, MA, USA (August 2000)"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Lamparter, B., Paul, K., Westhoff, D.: Charging Support for Ad Hoc Stub Networks. Journal of Computer Communication, Special Issue on Internet Pricing and Charging: Algorithms, Technology and Applications (2003)","DOI":"10.1016\/S0140-3664(03)00034-3"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28073-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T10:19:50Z","timestamp":1742552390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28073-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642280726","9783642280733"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28073-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}