{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:54:54Z","timestamp":1742925294159,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":17,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_37","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"217-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling Trust in Wireless Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Tirthankar","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Hui","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Alfarez Abdul-Rahman & Stephen Hailes, \u201cA Distributed Trust Model\u201d, ACM New Security Paradigm Workshop, 1997.","DOI":"10.1145\/283699.283739"},{"key":"37_CR2","unstructured":"Matt Blaze, Joan Feigenbaum, Jack Lacy, \u201cDecentralized Trust Management\u201d, inProc. IEEE Conference on Security and Privacy, Oakland, CA, May 1996."},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker, \u201cMitigating Routing Misbehavior in MobileAd-hocNetworks\u201d, inProceedings of the 6\n                th\n              \n              Annual International Conference on Mobile Computing and Networking (MobiCom), Boston, Massachusetts, United States, August 06 - 11, 2000.","DOI":"10.1145\/345910.345955"},{"key":"37_CR4","unstructured":"Zheng Yan, Peng Zhang, Teemupekka Virtanen, \u201cTrust Evaluation Based Security Solution inAd-hocNetworks\u201d, inProc. of NordSec 2003, Norway, 2003."},{"key":"37_CR5","unstructured":"Asad Amir Pirzada and Chris McDonald, \u201cEstablishing Trust in Pure Ad-hoc Networks\u201d, appeared in 27\n                th\n              \n              Australian Computer Science Conference, The Univ. of Otago, Dunedin, New Zealand, 2004."},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"J. Li, R. Li, J. Kato, \u201cFuture Trust Management Framework for Mobile Ad-hoc Networks\u201d,IEEE Communications Magazine, April 2008.","DOI":"10.1109\/VETECS.2007.24"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Y. L. Sun, Z. Han, W. Yu, K.J.R. Liu, \u201cAttacks on Trust Evaluation in Distributed Networks\u201d, in Proc. of the 40\n                th\n              \n              annual conference on Information Science and Systems (CISS), Princeton, NJ, March 2006.","DOI":"10.1109\/CISS.2006.286695"},{"key":"37_CR8","unstructured":"Xiaoqi Li, Michael R. Lyu, Jiangchuan Liu, \u201cA Trust Model Based Routing Protocol for SecureAd-hocNetworks\u201d,Proceedings 2004 IEEE Aerospace Conference,Big Sky, Montana, U.S.A., March 6\u201313 2004."},{"issue":"3","key":"37_CR9","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. Josang","year":"2001","unstructured":"A. Josang, \u201cA Logic for Uncertain Probabilities\u201d,International Journal of Uncertainty, Fuzziness and Knowledge-based Systems,vol.9(3):pp.279\u2013311, 2001.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Sonja Buchegger and Jean-Yves Le Boudec, \u201cPerformance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Networks)\u201d, inProceedings of the Third ACM International Symposium on MobileAd-hocNetworking and Computing(MOBIHOC \u201802),Switzerland, June 9\u201311, 2002.","DOI":"10.1145\/513800.513828"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Pietro Michiardi and Refik Molva, \u201cCORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in MobileAd-hocNetworks\u201d,inProceedings of the 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia, 2002.","DOI":"10.1007\/978-0-387-35612-9_9"},{"issue":"5","key":"37_CR12","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1023\/A:1025146013151","volume":"8","author":"L. Butty\u00e1n","year":"2003","unstructured":"L. Butty\u00e1n and J.P.Hubaux, \u201cStimulating Cooperation in Self-Organizing Mobile Ad-hocNetworks\u201d,Mobile Network and Applications (MONET),vol.8(5), pp 579\u2013592, 2003.","journal-title":"Mobile Network and Applications (MONET)"},{"key":"37_CR13","unstructured":"T. Ghosh, N. Pissinou, K. Makki, A. Farhat, \u201cA Framework for Computing Trust in MobileAd-hocNetworks\u201d,Mobile and Wireless Network Security and Privacy, by Makki, K., et al (Eds.). Springer, ISBN: 978-0-387-71057-0. July 2007."},{"key":"37_CR14","unstructured":"AODV Implementation, (AODV-UU), Department of Information Technology, Uppsala University (Sweden), http:\/\/core.it.uu.se\/core\/index.php\/AODV-UU."},{"key":"37_CR15","unstructured":"Peter Reiher, et al., \u201cResearch Direction in Security and Privacy for Mobile and Wireless Networks\u201d,Technical Report to National Science Foundation, July 2006."},{"key":"37_CR16","unstructured":"T. Ghosh, B. Pratt, \u201cRouting Table Instability in Real-world Ad-Hoc Network Testbed\u201d,Advances in Computer and Information Science and Engineering, by Sobh, T. (Ed). Springer, ISBN 978-1-4020-8740-0, 2008."},{"key":"37_CR17","unstructured":"S. Buchegger, C. Tissieres, J.L.Boudec,\u201dA Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks\u2013HowMuch Can Watchdogs Really Do?\u201dinProceedings of IEEE WMCSA \u201804, English Lake District,UK, December 2004."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T13:14:49Z","timestamp":1675084489000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_37","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}