{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:08Z","timestamp":1742913848660,"version":"3.40.3"},"publisher-location":"India","reference-count":17,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132204862"},{"type":"electronic","value":"9788132204879"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-81-322-0487-9_20","type":"book-chapter","created":{"date-parts":[[2012,4,14]],"date-time":"2012-04-14T07:13:23Z","timestamp":1334387603000},"page":"201-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Trust Management Model for Wireless Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Brijesh Kumar","family":"Chaurasia","sequence":"first","affiliation":[]},{"given":"Ranjeet Singh","family":"Tomar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,15]]},"reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/MCOM.2008.4481349","volume":"46","author":"J. Li","year":"2008","unstructured":"Li, J., Li, R., Kato, J.: Future Trust Management Framework for Mobile Ad Hoc Networks. IEEE Communications Magazine\u00a046(4), 108\u2013114 (2008)","journal-title":"IEEE Communications Magazine"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Sun, Y.L., Han, Z., Yu, W., Liu, K.J.R.: A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. In: Proceedings 25th IEEE International Conference on Computer Communications, Barcelona, Spain, pp. 1\u201313 (2006)","DOI":"10.1109\/INFOCOM.2006.154"},{"issue":"2","key":"20_CR3","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1504\/IJAACS.2010.031091","volume":"3","author":"B.K. Chaurasia","year":"2010","unstructured":"Chaurasia, B.K., Verma, S.: Maximising Anonymity of a Vehicle. International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communications\u00a03(2), 198\u2013216 (2010)","journal-title":"International Journal of Autonomous and Adaptive Communications Systems (IJAACS), Special Issue on: Security, Trust, and Privacy in DTN and Vehicular Communications"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Baras, J.: Trust evaluation in ad-hoc networks. In: Proceedings of ACM Workshop on Wireless Security, USA, pp. 1\u201310 (2004)","DOI":"10.1145\/1023646.1023648"},{"key":"20_CR5","unstructured":"McKnight, D.H., Chervany, N.L.: The Meanings of Trust, Technical Report, University of Minnesota (1996)"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"4343","DOI":"10.1016\/j.comcom.2008.05.007","volume":"31","author":"A. Boukerche","year":"2008","unstructured":"Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications\u00a031, 4343\u20134351 (2008)","journal-title":"Computer Communications"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: 6th Annual International Conference on Mobile Computing and Networking (MobiCom-2000), pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Baras, S.: On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks. IEEE JSAC, Special Issue on Security in Wireless Ad Hoc Networks, 318\u2013328 (2006)","DOI":"10.1109\/JSAC.2005.861390"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Zouridaki, C.: A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs. In: Proc. 3rd ACM Wksp. Sec. Ad Hoc and Sensor Networks, pp. 1\u201310 (2005)","DOI":"10.1145\/1102219.1102222"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes \u2014 Fairness in Dynamic Ad-hoc NeTworks). In: Proc. ACM MobiHoc 2002, pp. 226\u2013236 (2002)","DOI":"10.1145\/513800.513828"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Ding, Q., Li, X., Jiang, M., Zhou, X.: Repudiation Management in Vehicular Ad Hoc Networks. In: International Conference on Multimedia Technology (ICMT), pp. 1-5 (2010)","DOI":"10.1109\/ICMULT.2010.5632149"},{"issue":"2","key":"20_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MC.2007.76","volume":"40","author":"H. Li","year":"2007","unstructured":"Li, H., Singhal, M.: Trust Management in Distributed Systems. Computer\u00a040(2), 45\u201353 (2007)","journal-title":"Computer"},{"issue":"2","key":"20_CR13","first-page":"41","volume":"6","author":"B.K. Chaurasia","year":"2011","unstructured":"Chaurasia, B.K., Verma, S.: Infrastructure based authentication in VANETs. International Journal of Multimedia and Ubiquitous Engineering\u00a06(2), 41\u201354 (2011)","journal-title":"International Journal of Multimedia and Ubiquitous Engineering"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Bakar, A.A., Ismail, R., Jais, J., Manan, J.-L.A.: Forming Trust in Mobile Ad-Hoc Network. In: International Conference on Communications and Mobile Computing (CMC 2009), pp. 470\u2013474 (2009)","DOI":"10.1109\/CMC.2009.143"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Capra, L.: Engineering human trust in mobile system collaborations. In: SIGSOFT FSE, pp. 107\u2013116 (2004)","DOI":"10.1145\/1041685.1029912"},{"key":"20_CR16","unstructured":"NCTUNs: Network simulator and emulator, \n                    http:\/\/nsl.csie.nctu.edu.tw\/nctuns.html\n                   (accessed on November 2008)"},{"key":"20_CR17","unstructured":"NS2: The Network Simulator ns-2, \n                    http:\/\/isi.edu\/nsnam\/ns\n                   (accessed on November 2008)"}],"container-title":["Advances in Intelligent and Soft Computing","Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-0487-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T23:41:41Z","timestamp":1675208501000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-0487-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9788132204862","9788132204879"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-0487-9_20","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"15 April 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}