{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:05Z","timestamp":1763468165454},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_10","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"115-126","source":"Crossref","is-referenced-by-count":3,"title":["A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"R.","family":"Deepa","sequence":"first","affiliation":[]},{"given":"S.","family":"Swamynathan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"J.H. Cho","year":"2011","unstructured":"Cho, J.H., Swami, A.: A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Commun. Surv. Tut.\u00a013(4), 562\u2013583 (2011)","journal-title":"IEEE Commun. Surv. Tut."},{"key":"10_CR2","first-page":"641","volume-title":"12th IEEE International Conference on Computational Science and Engineering","author":"J.H. Cho","year":"2009","unstructured":"Cho, J.H., Swami, A., Chen, I.R.: Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. In: 12th IEEE International Conference on Computational Science and Engineering, pp. 641\u2013650. IEEE Press, New York (2009)"},{"volume-title":"Trust in Society","year":"2003","key":"10_CR3","unstructured":"Cook, K.S. (ed.): Trust in Society. Russell Sage Foundation Series on Trust, New York (2003)"},{"key":"10_CR4","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, New Jersey (1976)"},{"key":"10_CR5","first-page":"13","volume":"9","author":"J. Dezert","year":"2002","unstructured":"Dezert, J.: Foundations for a New Theory of Plausible and Paradoxical Reasoning. Information and Security\u00a09, 13\u201357 (2002)","journal-title":"Information and Security"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"28","author":"A.P. Dempster","year":"1967","unstructured":"Dempster, A.P.: Upper and Lower Probabilities Induced by Multivalued Mapping. Annals of Mathematical Statistics\u00a028, 325\u2013339 (1967)","journal-title":"Annals of Mathematical Statistics"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory. Sandia Na-tional Laboratories, Albuquerque, New Mexico (2002)","DOI":"10.2172\/800792"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Deepa, R., Swamynathan, S.: The DBF-based Semantic Service Discovery for Mobile Ad Hoc Networks. Canadian Journal Electrical and Computer Engineering (accepted for Publication, 2014)","DOI":"10.1109\/CJECE.2013.6704694"},{"key":"10_CR9","unstructured":"Deepa, R., Swamynathan, S.: AHP-Entropy-TOPSIS based Clustering Protocol for Mobile Ad Hoc Networks. Ad Hoc & Sensor Wireless Networks. Old City Publishing (accepted for publication, 2014)"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/SURV.2011.042711.00083","volume":"14","author":"K. Govindan","year":"2012","unstructured":"Govindan, K., Mohapatra, P.: Trust Computations and Trust Dynamics in Mobile Ad Hoc Networks: A Survey. IEEE Commun. Surv. Tut.\u00a014(2), 279\u2013298 (2012)","journal-title":"IEEE Commun. Surv. Tut."},{"key":"10_CR11","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-34135-9_25","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"A. Kumar","year":"2012","unstructured":"Kumar, A., Aggarwal, A.: Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 240\u2013251. Springer, Heidelberg (2012)"},{"issue":"3","key":"10_CR12","first-page":"340","volume":"12","author":"C. Campo","year":"2006","unstructured":"Campo, C., Almen\u00e1rez, F., D\u00edaz, D., Garc\u00eda-Rubio, C., L\u00f3pez, A.M.: Secure Service Discovery based on Trust Management for Ad-hoc Networks. J. Univer. Comput. Sci.\u00a012(3), 340\u2013356 (2006)","journal-title":"J. Univer. Comput. Sci."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Han, S., Kim, J.M., Bin, H.: Service Discovery and Delivery System Based on Trust in Mobile Ad-Hoc Network. In: International Conference on Information Science and Security, pp. 171\u2013176 (2008)","DOI":"10.1109\/ICISS.2008.25"},{"key":"10_CR14","unstructured":"McNamara, L., Mascolo, C., Capra, L.: Trust and Mobility Aware Service Provision for Pervasive Computing. In: 1st International Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, pp. 603\u2013610 (2006)"},{"issue":"18","key":"10_CR15","doi-asserted-by":"publisher","first-page":"4281","DOI":"10.1016\/j.comcom.2008.07.014","volume":"31","author":"S.I. Ahamed","year":"2008","unstructured":"Ahamed, S.I., Sharmin, M.: A trust-based secure service discovery (TSSD) model for per-vasive computing. Computer Communications\u00a031(18), 4281\u20134293 (2008)","journal-title":"Computer Communications"},{"key":"10_CR16","unstructured":"Glowacka, J., Amanowicz, M.: Application of Dezert-Smarandache theory for tactical MANET security enhancement. In: IEEE Military Communications and Information Systems Conference, pp. 1\u20136 (2012)"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/TKDE.2009.57","volume":"22","author":"D. Guo","year":"2010","unstructured":"Guo, D., Wu, J., Chen, H., Yuan, Y., Luo, X.: The Dynamic Bloom Filters. IEEE T. Knowl. Data En.\u00a022(1), 120\u2013133 (2010)","journal-title":"IEEE T. Knowl. Data En."},{"key":"10_CR18","unstructured":"Smarandache, F., Dezert, J.: Advances and Applications of DSmT for Information Fusion, Collected works. Arp Publishers (2004)"},{"issue":"5","key":"10_CR19","doi-asserted-by":"publisher","first-page":"994","DOI":"10.1016\/j.csi.2008.09.025","volume":"31","author":"J. Wang","year":"2009","unstructured":"Wang, J., Sun, H.J.: A new evidential trust model for open communities. Comput. Stand. Inter.\u00a031(5), 994\u20131001 (2009)","journal-title":"Comput. Stand. Inter."},{"key":"10_CR20","unstructured":"Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: 27th Australian Conference on Computer Science, pp. 47\u201354 (2004)"},{"key":"10_CR21","unstructured":"J\u00f8sang, A., Ismail, R.: The Beta Reputation System. In: 15th Bled Conference on Elec-tronic Commerce, pp. 17\u201319 (2002)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Feng, R., Che, S., Wang, X., Yu, N.: Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks. Int. J. Distrib. Sens. N, 1\u20139 (2013)","DOI":"10.1155\/2013\/948641"},{"key":"10_CR23","unstructured":"The Network Simulator, ns-2, available from World Wide Web, http:\/\/nsnam.isi.edu\/nsnam"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Yoon, J., Liu, M., Noble, B.: Random Waypoint Considered Harmful. In: 22nd Annual Joint Conference on IEEE Computer and Communications, pp. 1312\u20131321 (2003)","DOI":"10.1109\/INFCOM.2003.1208967"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T00:42:32Z","timestamp":1648255352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}