{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:08:18Z","timestamp":1773324498751,"version":"3.50.1"},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,4,25]],"date-time":"2013-04-25T00:00:00Z","timestamp":1366848000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-013-0953-4","type":"journal-article","created":{"date-parts":[[2013,4,30]],"date-time":"2013-04-30T23:29:09Z","timestamp":1367364549000},"page":"661-663","source":"Crossref","is-referenced-by-count":6,"title":["Trust, security and privacy for pervasive applications"],"prefix":"10.1007","volume":"64","author":[{"given":"Guojun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,25]]},"reference":[{"key":"953_CR1","author":"T Good","year":"2010","unstructured":"Good T, Benaissa M (2010) A\u00a0holistic approach examining RFID design for security and privacy. J\u00a0Supercomput. doi: 10.1007\/s11227-010-0497-9","journal-title":"J\u00a0Supercomput"},{"key":"953_CR2","author":"Y Zeng","year":"2010","unstructured":"Zeng Y, Cao J, Hong J, Zhang S, Xie L (2010) Secure localization and location verification in wireless sensor networks: a survey. J Supercomput. doi: 10.1007\/s11227-010-0501-4","journal-title":"J Supercomput"},{"key":"953_CR3","author":"R Li","year":"2010","unstructured":"Li R, Li J (2010) Requirements and design for neutral trust management framework in unstructured networks. J Supercomput. doi: 10.1007\/s11227-010-0502-3","journal-title":"J Supercomput"},{"key":"953_CR4","author":"K Pongaliur","year":"2010","unstructured":"Pongaliur K, Xiao L, Liu AX (2010) Dynamic camouflage event based malicious node detection architecture. J Supercomput. doi: 10.1007\/s11227-010-0508-x","journal-title":"J Supercomput"},{"key":"953_CR5","author":"F Wang","year":"2011","unstructured":"Wang F, Wang FR, Huang B, Yang LT (2011) ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks. J Supercomput. doi: 10.1007\/s11227-010-0545-5","journal-title":"J Supercomput"},{"key":"953_CR6","author":"F Qi","year":"2011","unstructured":"Qi F, Tang Z, Wang G, Wu J (2011) User requirements-aware security ranking in SSL protocol. J\u00a0Supercomput. doi: 10.1007\/s11227-010-0546-4","journal-title":"J\u00a0Supercomput"},{"key":"953_CR7","author":"A Prathapani","year":"2011","unstructured":"Prathapani A, Santhanam L, Agrawal DP (2011) Detection of blackhole attack in a wireless mesh network using intelligent honeypot agents. J Supercomput. doi: 10.1007\/s11227-010-0547-3","journal-title":"J Supercomput"},{"key":"953_CR8","author":"H Zhao","year":"2011","unstructured":"Zhao H, Li X (2011) VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks. J Supercomput. doi: 10.1007\/s11227-011-0576-6","journal-title":"J Supercomput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0953-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-0953-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0953-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:24:10Z","timestamp":1559370250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-0953-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,25]]},"references-count":8,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["953"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-0953-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,25]]}}}