{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T19:52:07Z","timestamp":1759693927421,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766507","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T18:16:45Z","timestamp":1305310605000},"page":"436-441","source":"Crossref","is-referenced-by-count":14,"title":["Long-term reputation system for vehicular networking based on vehicle's daily commute routine"],"prefix":"10.1109","author":[{"given":"Soyoung","family":"Park","sequence":"first","affiliation":[]},{"given":"Baber","family":"Aslam","sequence":"additional","affiliation":[]},{"given":"Cliff C.","family":"Zou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/MAHSS.2008.4660129"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICDCS.Workshops.2008.24"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/s11277-006-9235-2"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/863956.863960"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/INFOCOM.2006.228"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TMC.2007.1060"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/586135.586138"},{"key":"ref3","first-page":"39","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"Journal of Computer Security special Issue on Security of Ad Hoc and Sensor Networks"},{"key":"ref6","first-page":"285","article-title":"Building an Efficient Distributed Reputation Scheme for Peer-to-Peer Networks","author":"tian","year":"0","journal-title":"Proc of IEEE Int'l Symposium on Information Science and Engineering"},{"key":"ref5","first-page":"441","article-title":"Choosing Reputable Servants in a P2P Networks","author":"cornelli","year":"0","journal-title":"Proc Int'l World Wide Web Conf"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1180345.1180349"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1287853.1287865"},{"key":"ref2","article-title":"Design Secure and Application-Oriented VANETs","author":"qian","year":"0","journal-title":"IEEE VTC 2008-Spring"},{"year":"2010","author":"hartenstein","journal-title":"VANET Vehicular Applications and Inter-Networking Technologies","key":"ref1"},{"key":"ref9","first-page":"651","article-title":"A Group-based Reputation Mechanism for Mobile P2P Networks","author":"wu","year":"2005","journal-title":"LNCS 3828"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2011,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766507.pdf?arnumber=5766507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T05:36:05Z","timestamp":1490074565000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766507","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}