{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:24:12Z","timestamp":1730237052242,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,29]]},"DOI":"10.1109\/iccta32607.2013.9529882","type":"proceedings-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T15:39:51Z","timestamp":1631029191000},"page":"75-81","source":"Crossref","is-referenced-by-count":0,"title":["Towards Trusted Mobile Ad-Hoc Clouds"],"prefix":"10.1109","author":[{"given":"Ahmed","family":"Hammam","sequence":"first","affiliation":[]},{"given":"Samah","family":"Senbel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"A Survey Study on Reputation-Based Trust Management in P2P Networks","author":"maini","year":"2006","journal-title":"Reputation-based P2P Survey"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1169075.1169081"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.123"},{"article-title":"An evaluation framework for reputation management systems","year":"2009","author":"west","key":"ref13"},{"key":"ref14","article-title":"A Robust Reputation System for Mobile ad hoc Networks. Technical Report","author":"buchegger","year":"2003","journal-title":"IC\/2003\/50 EPFL-DI-ICA"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1009.I9P0339"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","article-title":"Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing","volume":"18","author":"rahbar","year":"2007","journal-title":"Parallel and Distributed Systems IEEE Transactions on"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.111"},{"key":"ref3","article-title":"A survey of mobile cloud computing: architecture, applications, and approaches","author":"dinh","year":"2011","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.129"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2012.6207720"},{"article-title":"An approach to ad hoc cloud computing","year":"2010","author":"kirby","key":"ref7"},{"key":"ref2","article-title":"Mobile cloud computing: A survey","author":"fernando","year":"2012","journal-title":"Future Generation Computer Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4038\/icter.v4i2.4674"},{"key":"ref9","article-title":"Towards Ubiquitous Computing Clouds","author":"khalifa","year":"2011","journal-title":"FUTURE COMPUTING 2011 the Third International Conference on Future Computational Technologies and Applications"}],"event":{"name":"2013 23rd International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2013,10,29]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2013,10,31]]}},"container-title":["2013 23rd International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9529351\/9529352\/09529882.pdf?arnumber=9529882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T19:12:16Z","timestamp":1638299536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9529882\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,29]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccta32607.2013.9529882","relation":{},"subject":[],"published":{"date-parts":[[2013,10,29]]}}}