{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:20:38Z","timestamp":1729671638316,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/lcn.2008.4664309","type":"proceedings-article","created":{"date-parts":[[2008,11,5]],"date-time":"2008-11-05T19:49:04Z","timestamp":1225914544000},"page":"958-965","source":"Crossref","is-referenced-by-count":0,"title":["Key revocation based on Dirichlet multinomial model for mobile ad hoc networks"],"prefix":"10.1109","author":[{"family":"Xinxin Fan","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"47","article-title":"identity based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1984","journal-title":"ser LNCS"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.58"},{"key":"17","first-page":"362","article-title":"identity-based access control for ad hoc groups","volume":"3506","author":"saxena","year":"2004","journal-title":"ser LNCS"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"15","first-page":"232","article-title":"new strategies for revocation in ad hoc networks","volume":"4572","author":"moore","year":"2007","journal-title":"ser LNCS"},{"key":"16","first-page":"41","article-title":"analysis of a reputation system for mobile ad-hoc networks with liars","author":"mundinger","year":"2005","journal-title":"Proceedings of WiOpt 2005 Modeling and Optimization in Mobile Ad Hoc and Wireless Networks"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.838598"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269717"},{"key":"11","first-page":"324","article-title":"the beta reputation systems","author":"j\ufffdsang","year":"2002","journal-title":"Proceedings of the 15th Bled Electronic Commerce Conference - eReality Constructing the eEconomy"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.71"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208967"},{"key":"3","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/288235.288256","article-title":"a performance comparison of multi-hop wireless ad hoc network routing protocols","author":"broch","year":"1998","journal-title":"Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom"},{"key":"20","first-page":"48","article-title":"filtering out unfair ratings in bayesian reputation systems","volume":"4","author":"withby","year":"2005","journal-title":"The Icfain Journal of Management Research"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.07.003"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/0470118474"},{"key":"10","first-page":"101","article-title":"probabilistic logic under uncertainty","volume":"65","author":"j\ufffdsang","year":"2007","journal-title":"Proceedings of the thirteenth Australasian symposium on Theory of computing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1470831"},{"key":"6","article-title":"the effect of rumor spreading in reputation systems for mobile ad-hoc networks","author":"buchegger","year":"2003","journal-title":"Proceedings of WiOpt'03 Modeling and Optimization in Mobile Ad Hoc and Wireless Networks"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815102"},{"year":"0","key":"9"},{"journal-title":"Bayesian Data Analysis","year":"2004","author":"gelman","key":"8"}],"event":{"name":"2008 33rd IEEE Conference on Local Computer Networks (LCN 2008)","start":{"date-parts":[[2008,10,14]]},"location":"Montreal, QB, Canada","end":{"date-parts":[[2008,10,17]]}},"container-title":["2008 33rd IEEE Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4656373\/4664131\/04664309.pdf?arnumber=4664309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:22:42Z","timestamp":1632097362000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4664309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/lcn.2008.4664309","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}