{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:18:16Z","timestamp":1725617896582},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/mahss.2005.1542827","type":"proceedings-article","created":{"date-parts":[[2005,12,13]],"date-time":"2005-12-13T20:55:52Z","timestamp":1134507352000},"page":"413-421","source":"Crossref","is-referenced-by-count":13,"title":["Active collaborations for trustworthy data management in ad hoc networks"],"prefix":"10.1109","author":[{"given":"A.","family":"Patwardhan","sequence":"first","affiliation":[]},{"given":"F.","family":"Perich","sequence":"additional","affiliation":[]},{"given":"A.","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"T.","family":"Finin","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Yesha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"MoGATU Data Management in Pervasive Computing Enviroments","year":"0","author":"perich","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206958"},{"journal-title":"Statistically Unique and Cryptographically Verifiable(SUCV) Identifiers and Addresses","year":"2002","author":"montenegro","key":"18"},{"key":"15","first-page":"251","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"IPTPS"},{"key":"16","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-44577-3_2","article-title":"Challenges in ubiquitous data management","author":"franklin","year":"2001","journal-title":"Informatics&#x2014 10 Years Back 10 Years Ahead"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373258"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/355324.355325"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/98.944001"},{"key":"12","article-title":"Profile driven data management","author":"cherniak","year":"2002","journal-title":"28th International Conference on Very Large Databases"},{"key":"21","article-title":"Profile driven data management for pervasive environments","author":"perich","year":"2002","journal-title":"International Conference on Database and Expert Systems Applications (DEXA) 2002"},{"journal-title":"MoGATU BDI Ontology","year":"2004","author":"perich","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1277823"},{"journal-title":"International Conference on Mobile and Ubiquitous Systems Networking and Services","year":"2004","author":"perich","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2003.1192773"},{"key":"25","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/383059.383071","article-title":"Chord: A scalable peer-to-peer lookup service for internet applications","author":"stoica","year":"2001","journal-title":"Proceedings of the 2001 conference on Applications technologies architectures and protocols for computer communications"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.1998.685281"},{"journal-title":"Open Source Napster Sever","year":"0","key":"3"},{"journal-title":"IEEE Standards for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Network - Specific Requirements - Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587125"},{"journal-title":"G2dn Gnutella2 Developer's Network","year":"0","key":"1"},{"year":"2005","key":"7"},{"year":"2005","key":"6"},{"journal-title":"Wireless LAN MAC and PHY Specifications Higher Speed Physical Layer (PHY) Extension in the 2 4 GHz Band","year":"0","key":"5"},{"year":"0","key":"4"},{"journal-title":"Internet Draft Cryptographically Generated Addresses (CGA)","year":"2004","author":"aura","key":"9"},{"year":"2005","key":"8"}],"event":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","location":"N\/A"},"container-title":["IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10355\/32951\/01542827.pdf?arnumber=1542827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T12:06:38Z","timestamp":1626869198000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1542827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/mahss.2005.1542827","relation":{},"subject":[]}}