{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:06:42Z","timestamp":1725552402486},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/seccom.2007.4550299","type":"proceedings-article","created":{"date-parts":[[2008,6,25]],"date-time":"2008-06-25T18:08:16Z","timestamp":1214417296000},"page":"2-10","source":"Crossref","is-referenced-by-count":4,"title":["NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography"],"prefix":"10.1109","author":[{"given":"Mawloud","family":"Omar","sequence":"first","affiliation":[]},{"given":"Yacine","family":"Challal","sequence":"additional","affiliation":[]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/112600.112605"},{"key":"ref30","article-title":"The Kerberos Network Authentication Service Version 5","author":"kohl","year":"1991","journal-title":"RFC 1510"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"article-title":"Understanding PKI: Concepts, Standards, and Deployment Considerations","year":"2004","author":"adams","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(02)00120-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015399632291"},{"key":"ref15","article-title":"A Proposal for Trust Models: Independent Trust Intermediary Service","author":"ma","year":"2002","journal-title":"International Association for Development of the Information Society"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"journal-title":"Public-Key and Attribute Certificate Frame-works","year":"2001","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1006\/inco.2001.3054"},{"key":"ref28","article-title":"A Distributed Trust Model","author":"abdulrahman","year":"1997","journal-title":"Proceedings of the '97 New Security Paradigms Workshop"},{"key":"ref4","article-title":"Kerberos Assisted Authentication in Mobile Ad-hoc Networks","author":"pirzada","year":"2004","journal-title":"Proc 27th Australian Computer Science Conference"},{"key":"ref27","article-title":"The PGP Trust Model","author":"abdulrahman","year":"1997","journal-title":"The journal of Electronic Commerce"},{"key":"ref3","article-title":"Secure and Efficient Key Management in Mobile Ad Hoc Networks","author":"wu","year":"2005","journal-title":"Proceedings of the 19th IEEE international Parallel and Distributed Processing Symposium"},{"key":"ref6","article-title":"SORI: A secure and objective reputation-based incentive scheme for ad hoc networks","author":"he","year":"2004","journal-title":"IEEE Wireless Communications and Networking Conference"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"ref5","article-title":"PILOT: Probabilistic Lightweight group communication system for Mobile Ad hoc Networks","author":"luo","year":"2004","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref8","article-title":"MOCA: Mobile Certificate Authority for Wireless Ad hoc Networks","author":"yi","year":"2003","journal-title":"Proceedings of 2nd Annual PKI Research Workshop"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2003.1200612"},{"key":"ref2","article-title":"DICTATE: Distributed Certification Authority with Probabilistic Freshness for Ad hoc Networks","author":"luo","year":"2005","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref9","article-title":"A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem","author":"hwang","year":"2003","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2006.253522"},{"key":"ref20","article-title":"Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks","author":"kong","year":"2001","journal-title":"Proc IEEE Int Conf Network Protocols (ICNP 01)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref21","article-title":"Ubiquitous and Robust Authentication Services for Ad hoc Wireless Networks","author":"luo","year":"2000","journal-title":"Technical Report"},{"key":"ref24","article-title":"Internet X509 PKI Certificate Policy and Certification Practices Framework","author":"chokhani","year":"1999","journal-title":"RFC 2527"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/65.806987"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312207"},{"key":"ref25","article-title":"Securing Adhoc Networks","author":"zhou","year":"1999","journal-title":"IEEE Network"}],"event":{"name":"2007 3rd International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007","start":{"date-parts":[[2007,9,17]]},"location":"Nice, France","end":{"date-parts":[[2007,9,21]]}},"container-title":["2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543879\/4550291\/04550299.pdf?arnumber=4550299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T14:27:17Z","timestamp":1489674437000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4550299\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/seccom.2007.4550299","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}