{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:38:54Z","timestamp":1774719534539,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/infcom.2003.1209220","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"1987-1997","source":"Crossref","is-referenced-by-count":643,"title":["Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks"],"prefix":"10.1109","volume":"3","author":[{"given":"S.","family":"Zhong","sequence":"first","affiliation":[]},{"given":"J.","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Y.R.","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380883"},{"key":"35","year":"0","journal-title":"IEEE P1363 Standard"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1006\/game.1999.0790"},{"key":"18","first-page":"1","article-title":"Algorithms for selfish agents","author":"nisan","year":"1999","journal-title":"16th Annual Symposium on Theoretical Aspects of Computer Science"},{"key":"33","year":"1995","journal-title":"Secure Hash Standard"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/35.894385"},{"key":"34","author":"dai","year":"0","journal-title":"Crypto++4 0"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"},{"key":"13","article-title":"A micropayment scheme encouraging collaboration in multi-hop cellular networks","author":"jakobsson","year":"2003","journal-title":"Proceedings of Financial Crypto 2003"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904773"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019263"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019260"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2001.1754"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959899"},{"key":"22","article-title":"Incentives in peer-to-peer file sharing","author":"golle","year":"2001","journal-title":"Proceedings of the ACM Symposium on Electronic Commerce (EC 01) 2001"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/571855.571856"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/506147.506153"},{"key":"25","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1023\/A:1019197320544","article-title":"Vertical handoffs in wireless overlay networks","volume":"3","author":"stemm","year":"1998","journal-title":"Mobile Networks and Applications"},{"key":"26","article-title":"Securing ad hoc networks","author":"zhou","year":"1999","journal-title":"IEEE Network Magazine"},{"key":"27","article-title":"Self-securing ad-hoc wireless networks","author":"luo","year":"2002","journal-title":"ISCC"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1038\/nmat1559"},{"key":"29","article-title":"A secure routing protocol for ad hoc networks","author":"dahill","year":"2001","journal-title":"UMass Tech Rep"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/378420.378441"},{"key":"2","author":"toh","year":"2001","journal-title":"Ad Hoc Mobile Wireless Networks Protocols and Systems"},{"key":"10","author":"osborne","year":"1994","journal-title":"A Course in Came Theory"},{"key":"1","author":"perkins","year":"2000","journal-title":"Ad Hoc Networking"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2002.994321"},{"key":"6","article-title":"Stimulating cooperation in self-organizing mobile ad hoc networks","author":"buttyan","year":"2002","journal-title":"ACM Journal For Mobile Networks (MONET) Special Issue On Mobile Ad Hoc Networks"},{"key":"32","volume":"1321","author":"rivest","year":"1992","journal-title":"The MD5 Message Digest Algorithm RFC"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/505696.505704"},{"key":"4","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proceedings of The Sixth International Conference on Mobile Computing and Networking 2000"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200610"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"}],"event":{"name":"IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies","location":"San Francisco, CA, USA","acronym":"INFCOM-03"},"container-title":["IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8585\/27207\/01209220.pdf?arnumber=1209220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:04:44Z","timestamp":1497571484000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1209220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/infcom.2003.1209220","relation":{},"subject":[]}}