{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T02:19:29Z","timestamp":1696040369998},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T00:00:00Z","timestamp":1289260800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-010-0502-3","type":"journal-article","created":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T09:01:44Z","timestamp":1289206904000},"page":"702-716","source":"Crossref","is-referenced-by-count":10,"title":["Requirements and design for neutral trust management framework in unstructured networks"],"prefix":"10.1007","volume":"64","author":[{"given":"Ruidong","family":"Li","sequence":"first","affiliation":[]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,9]]},"reference":[{"key":"502_CR1","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B Bloom","year":"1970","unstructured":"Bloom B (1970) Space\/time trade-offs in hash coding with allowable errors. Commun ACM 13:422\u2013426","journal-title":"Commun ACM"},{"key":"502_CR2","doi-asserted-by":"crossref","unstructured":"Buchegger S, Le Boudec J-Y (2002) Performance analysis of the CONFIDANT protocol (cooperation of nodes\u2014fairness in dynamic ad-hoc networks). In: Proceedings of ACM MobiHoc 2002, Atlanta, USA, Sept","DOI":"10.1145\/513824.513828"},{"key":"502_CR3","unstructured":"Buchegger S, Le Boudec J-Y (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of P2PEcon 2004, Harvard University, Cambridge, MA, USA, June"},{"issue":"1","key":"502_CR4","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1198255.1198263","volume":"37","author":"J Crowcroft","year":"2007","unstructured":"Crowcroft J (2007) Net neutrality\u2014the technical side of the debate: a white paper. ACM Comput Commun Rev 37(1):49\u201355","journal-title":"ACM Comput Commun Rev"},{"key":"502_CR5","series-title":"Cambridge series in statistical and probabilistic mathematics","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815850","volume-title":"Statistical models","author":"A Davison","year":"2003","unstructured":"Davison A (2003) Statistical models. Cambridge series in statistical and probabilistic mathematics. Cambridge University Press, Cambridge"},{"key":"502_CR6","doi-asserted-by":"crossref","unstructured":"Ferdous R, Muthukkumarasamy V, Sattar A (2010) Trust formalization in mobile ad-hoc networks. In: IEEE 24th international conference on advanced information networking and applications workshops, pp 351\u2013356","DOI":"10.1109\/WAINA.2010.22"},{"key":"502_CR7","doi-asserted-by":"crossref","unstructured":"Ganeriwal S, Srivastava M (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the ACM workshop on security of ad hoc and sensor networks (SASN 2004), Washington, DC, USA, Oct 25","DOI":"10.1145\/1029102.1029115"},{"issue":"4","key":"502_CR8","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T Grandison","year":"2000","unstructured":"Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv Tutor Fourth Quarter 3(4):2\u201316","journal-title":"IEEE Commun Surv Tutor Fourth Quarter"},{"key":"502_CR9","unstructured":"J\u00f8sang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled conference on electronic commerce, Bled, Slovenia, 17\u201319 June"},{"key":"502_CR10","doi-asserted-by":"crossref","unstructured":"Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of 12th international World Wide Web conferences, May","DOI":"10.1145\/775240.775242"},{"key":"502_CR11","doi-asserted-by":"crossref","unstructured":"Li R, Li J, Liu P, Chen H-H (2007) An objective trust management framework for mobile ad hoc networks. In: IEEE 65th vehicular technology conference VTC 2007 spring (IEEE VTC 2007 spring), 23\u201325 April, pp 56\u201360","DOI":"10.1109\/VETECS.2007.24"},{"key":"502_CR12","doi-asserted-by":"crossref","unstructured":"Marti S, Giuli T, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of MobiCom 2000, Aug, pp 255\u2013265","DOI":"10.1145\/345910.345955"},{"key":"502_CR13","doi-asserted-by":"crossref","unstructured":"Shankaran R, Varadharajan V, Orgun MA, Hitchens M (2009) Critical issues in trust management for mobile ad-hoc networks. In: Proceedings of the 10th IEEE international conference on information reuse & integration, pp 97\u2013100","DOI":"10.1109\/IRI.2009.5211602"},{"key":"502_CR14","doi-asserted-by":"crossref","unstructured":"Sun Y, Han Z, Yu W, Liu KJR (2006) A trust evaluation framework in distributed networks vulnerability analysis and defense against attacks. In: Proceedings of the IEEE Infocom 2006, Apr, Barcelona, Spain","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"502_CR15","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos G, Baras S (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun, Special Issue on Security in Wireless Ad-Hoc Networks, Feb 2006","DOI":"10.1109\/JSAC.2005.861390"},{"key":"502_CR16","doi-asserted-by":"crossref","unstructured":"Zouridaki C, Mark BL, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks (SASN 2005), Alexandria, VA, USA, November 7","DOI":"10.1145\/1102219.1102222"},{"key":"502_CR17","volume-title":"Malicious users in unstructured networks","author":"G Theodorakopoulos","year":"1995","unstructured":"Theodorakopoulos G, Baras JS (1995) Malicious users in unstructured networks. MIT Press, Cambridge"},{"key":"502_CR18","unstructured":"Yang X, Tsudik G, Liu X (2006) A technical approach to net neutrality. In: Fifth workshop on hot topics in networks (ACM HotNets-V), Irvine"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0502-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0502-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0502-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T00:08:38Z","timestamp":1559779718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0502-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,9]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["502"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0502-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,9]]}}}