{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:38:12Z","timestamp":1729633092457,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/ic3.2013.6612232","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:38:09Z","timestamp":1380652689000},"page":"421-426","source":"Crossref","is-referenced-by-count":3,"title":["Lightweight trust propagation scheme for resource constraint mobile ad-hoc networks (MANETs)"],"prefix":"10.1109","author":[{"given":"Adarsh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Krishna","family":"Gopal","sequence":"additional","affiliation":[]},{"given":"Alok","family":"Aggarwal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029912"},{"year":"0","key":"35"},{"key":"17","first-page":"275","volume":"16","author":"tseng","year":"2005","journal-title":"An Improved Conference Key Agreement Protocol with Forward Secrecy"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.10.053"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1994.1012"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/nem.561"},{"year":"0","key":"34"},{"key":"16","first-page":"369","volume":"13","author":"tseng","year":"2002","journal-title":"Cryptanalysis and Improvement of Key Distribution System for Csat Satellite Communication"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.09.010"},{"journal-title":"Analysis of Key Agreement Protocols","year":"2006","author":"vesteras","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.8"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1089803.1089975"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451015"},{"journal-title":"Proceedings of ITrust LNCS","year":"2006","author":"quercia","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"23","article-title":"Trust management for the semantic web","author":"rheingold","year":"2003","journal-title":"Proc of ISWC"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029115"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286695"},{"key":"26","first-page":"1862","article-title":"Trust modeling and evaluation in ad hoc networks","author":"sun","year":"2005","journal-title":"IEEE GLOBECOM"},{"key":"27","article-title":"Mechanism for coping with unfair rating and discriminatory behavior in online reputation reporting systems","author":"dellarocas","year":"2000","journal-title":"Proc ICISIP"},{"key":"28","first-page":"416","article-title":"EigenTrusttp++: Attack resilient trust management","author":"fan","year":"2012","journal-title":"CollaborateCom 2012"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.10.021"},{"key":"3","first-page":"62","article-title":"Detection of colluding selective forwarding nodes in wireless mesh networks based on channel aware detection algorithm","volume":"2","author":"vigilkumar","year":"2011","journal-title":"MES Journal of Technology & Management"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00083"},{"key":"10","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/11429760_19","article-title":"An evidence based architecture for efficient, attack-resistant computational trust dissemination in Peer-to-Peer networks","volume":"3477","author":"ingram","year":"2005","journal-title":"Proceeding of 3rd International Conference on Trust Management Lecture Notes on Computer Science"},{"key":"1","article-title":"Information theoretic framework of trust modeling and evaluation for ad hoc networks","author":"sun","year":"2006","journal-title":"IEEE JSAC special issue on security in wireless ad hoc networks"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2011.86"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.64"},{"key":"6","first-page":"139","article-title":"TMR2: An enhanced MR2 with a lightweight user trust model","author":"kardan","year":"2008","journal-title":"Selected Papers From Communication & Information Technology 2008 Circuits Systems and Signals 2008 Applied Mathematics Simulation Modeling"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/371626.371720"},{"journal-title":"A Survey on Trust Management for Mobile Ad Hoc Networks","year":"2012","author":"england","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.942344"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/FCST.2007.29"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.043670"}],"event":{"name":"2013 Sixth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2013,8,8]]},"location":"Noida, India","end":{"date-parts":[[2013,8,10]]}},"container-title":["2013 Sixth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6595807\/6612154\/06612232.pdf?arnumber=6612232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:55:38Z","timestamp":1498085738000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6612232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ic3.2013.6612232","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}