{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:17:44Z","timestamp":1729624664642,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/cscwd.2010.5471881","type":"proceedings-article","created":{"date-parts":[[2010,6,4]],"date-time":"2010-06-04T14:12:22Z","timestamp":1275660742000},"page":"717-722","source":"Crossref","is-referenced-by-count":1,"title":["Game theoretic approach in multipath routing for tradeoff between routing security and performance"],"prefix":"10.1109","author":[{"given":"Siguang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Meng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1000"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/512507"},{"key":"ref12","article-title":"Introducing Traffic Analysis","author":"danezis","year":"2007","journal-title":"Digital Privacy Theory Technologies and Practices"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.60"},{"article-title":"A Course in Game Theory","year":"0","author":"osborne","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513802"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.73"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/TVT.2008.923683","article-title":"A secure routing protocol against byzantine attacks for MANETs in adversarial environments","volume":"58","author":"yu","year":"2009","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-007-0039-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.897956"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199427"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.07.003"},{"key":"ref2","article-title":"Ad hoc on demand distance (AODV) vector routing","author":"perkins","year":"2003","journal-title":"rFC 3561"},{"article-title":"The dynamic source routing protocol for mobile Ad Hoc networks (DSR)","year":"2003","author":"johnson","key":"ref1"},{"key":"ref9","first-page":"266","article-title":"A game theory based load-balancing routing with cooperation stimulation for wireless ad hoc networks","author":"hui","year":"2009","journal-title":"Proc the 11th IEEE International Conference on High Performance Computing and Communications"}],"event":{"name":"2010 14th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2010,4,14]]},"location":"Shanghai, China","end":{"date-parts":[[2010,4,16]]}},"container-title":["The 2010 14th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5466608\/5471868\/05471881.pdf?arnumber=5471881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T05:04:28Z","timestamp":1497848668000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5471881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2010.5471881","relation":{},"subject":[],"published":{"date-parts":[[2010,4]]}}}