{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:00:23Z","timestamp":1729677623567,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266463","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T21:59:13Z","timestamp":1443131953000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems"],"prefix":"10.1109","author":[{"given":"Riccardo","family":"Pecori","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Trust-based Routing for Kademlia in a Sybil Scenario XXII IEEE SoftCOM Int Conf on Software Telecomm and Computer Networks","year":"2014","author":"pecori","key":"ref10"},{"key":"ref11","first-page":"47","article-title":"Identity-based cryptosystem based on the discrete logarithm problem","author":"shamir","year":"1985","journal-title":"Proc CRTPTO'84"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_42"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425529"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688717"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.149"},{"key":"ref16","article-title":"Building a web of trust without explicit trust ratings","author":"kim","year":"2008","journal-title":"IEEE Data Engineering Workshop 2008 ICDEW 2008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.134"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.203"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364948"},{"key":"ref4","article-title":"A Key Agreement Protocol for P2P VoIP Applications","author":"pecori","year":"2009","journal-title":"International Conference on Software Telecommunications and Computer Networks"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2012.09.001"},{"journal-title":"IETF RFC 2459","article-title":"Internet X.509 Public Key Infrastructure Certificate and CRL Profile","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TDSC.2014.2315198","article-title":"A denial of service attack to umts networks using sim-less devices","volume":"11","author":"merlo","year":"2014","journal-title":"Dependable and Secure Computing IEEE Transactions on"},{"key":"ref8","first-page":"2731","article-title":"The pgp trust model","volume":"10","author":"abdul-rahman","year":"1997","journal-title":"EDI-Forum The Journal of Electronic Commerce"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2000.883720"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-013-9697-y"},{"key":"ref1","first-page":"1","article-title":"A decentralized load balancing algorithm for heterogeneous wireless access networks","author":"oddi","year":"0","journal-title":"WTC 2014 World Telecommunications Congress 2014 Proceedings of"},{"key":"ref9","article-title":"SIP: Session Initiation Protocol","author":"rosenberg","year":"2002","journal-title":"IETF RFC 3261"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-88-470-1818-1_8"},{"journal-title":"Deus-project hosting on google code [online]","year":"2010","author":"agosti","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1002\/sec.131","article-title":"A robust self-organizing public key management for mobile ad hoc networks","volume":"3","author":"dahshan","year":"2010","journal-title":"Security and Communication Networks"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2015,7,27]]},"location":"Paris, France","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266463.pdf?arnumber=7266463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T18:39:45Z","timestamp":1599590385000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266463","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}