{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:37:02Z","timestamp":1729651022619,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/aiccsa.2008.4493607","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:37:07Z","timestamp":1209389827000},"page":"718-725","source":"Crossref","is-referenced-by-count":0,"title":["PerformTrust: Trust model integrated past and current performance in P2P file sharing systems"],"prefix":"10.1109","author":[{"family":"Jianming Fu","sequence":"first","affiliation":[]},{"family":"Huijun Xiong","sequence":"additional","affiliation":[]},{"family":"Zhou Li","sequence":"additional","affiliation":[]},{"family":"Huanguo Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","journal-title":"PeerSim","key":"19"},{"year":"0","key":"17"},{"year":"1996","author":"mcknight","article-title":"the meanings of trust","key":"18"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.2005.1498344","article-title":"pollution in p2p file sharing systems","author":"liang","year":"2005","journal-title":"IEEE INFOCOM 2005"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"13","first-page":"1","article-title":"open problems in data-sharing peer-to-peer systems","volume":"2572","author":"daswani","year":"2003","journal-title":"LNCS"},{"key":"14","first-page":"42","article-title":"a survey of peer-to-peer security issues","volume":"2609","author":"wallach","year":"2002","journal-title":"LNCS"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/CTS.2006.22"},{"year":"2003","author":"zhang","article-title":"making eigenvector-based reputation systems robust to collusion","key":"12"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/355112.355122"},{"year":"2000","journal-title":"Gnutella","key":"2"},{"year":"0","journal-title":"Kazza","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/988772.988787"},{"year":"0","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/EEE.2005.14"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/CEC-EEE.2007.83"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/TKDE.2004.1318566"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/TPDS.2007.1021"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/HICSS.2005.58"}],"event":{"name":"2008 IEEE\/ ACS International Conference on Computer Systems and Applications (AICCSA '08)","start":{"date-parts":[[2008,3,31]]},"location":"Doha","end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE\/ACS International Conference on Computer Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4488216\/4493499\/04493607.pdf?arnumber=4493607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T03:30:59Z","timestamp":1497756659000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4493607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2008.4493607","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}