{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:59:44Z","timestamp":1769914784960,"version":"3.49.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-12-1-0445"],"award-info":[{"award-number":["W911NF-12-1-0445"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2018,1,1]]},"DOI":"10.1109\/tdsc.2016.2530705","type":"journal-article","created":{"date-parts":[[2016,2,16]],"date-time":"2016-02-16T19:15:31Z","timestamp":1455650131000},"page":"151-165","source":"Crossref","is-referenced-by-count":46,"title":["PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks"],"prefix":"10.1109","volume":"15","author":[{"given":"Jin-Hee","family":"Cho","sequence":"first","affiliation":[]},{"given":"Ing-Ray","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.281"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.188"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1109\/SURV.2013.042313.00103","article-title":"A survey of social-aware routing protocols in delay tolerant networks: Applications, taxonomy and design-related issues","volume":"16","author":"wei","year":"2014","journal-title":"IEEE Commun Surv Tuts"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2007.4351716"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.107"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935157"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.093010.100492"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080602"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.032612.00004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2008.79"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.235"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.43"},{"key":"ref13","first-page":"82","article-title":"An approach to evaluate data trustworthiness based on data provenance","volume":"5159","author":"bertino","year":"0","journal-title":"Proc 5th VLDB Workshop Secure Data Mgt"},{"key":"ref14","first-page":"383","article-title":"A demspter-shafer approach to provenance-aware trust assessment","author":"yu","year":"0","journal-title":"Proc Int Symp Collaborative Technol Syst"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_12"},{"key":"ref16","first-page":"188","article-title":"Provenance-aware secure networks","author":"zhou","year":"0","journal-title":"Proc IEEE 24th Int Conf Data Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1314313.1314318"},{"key":"ref18","first-page":"1","article-title":"Securing provenance","author":"braun","year":"0","journal-title":"Proc 3rd Conf Hot Topics Security"},{"key":"ref19","first-page":"1","article-title":"The case of the fake picasso: Preventing history forgery with secure provenance","author":"hasan","year":"0","journal-title":"Proc 7th Conf File Storage Technol"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080604"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"key":"ref27","first-page":"218","article-title":"RelayCast: Scalable multicast routing in delay tolerant networks","author":"lee","year":"0","journal-title":"Proc IEEE Int Conf Netw Protocols"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.116"},{"key":"ref6","first-page":"1","article-title":"The Beta reputation system","author":"j\u00f8sang","year":"2002","journal-title":"Proc Bled Electronic Commerce Conf"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.06.081216"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29852-3_4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89965-5_31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.138"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683235"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2010.5478496"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0276-9"},{"key":"ref46","year":"0"},{"key":"ref20","first-page":"1","article-title":"Chaining for securing data provenance in distributed information networks","author":"wang","year":"0","journal-title":"Proc IEEE Mil Commun Conf"},{"key":"ref45","first-page":"1","article-title":"A robust reputation system for P2P and mobile ad-hoc networks","author":"buchegger","year":"0","journal-title":"Proc 2nd Workshop Econ Peer-to-Peer Syst"},{"key":"ref48","author":"perrig","year":"2002","journal-title":"Secure Broadcast Communication In Wired and Wireless Networks"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755723"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2008.161"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.36"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1858158.1858162"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.232"},{"key":"ref23","first-page":"1","article-title":"Energy-efficient provenance transmission in large-scale wireless sensor networks","author":"alam","year":"2011","journal-title":"Proc IEEE Int Symp World Wireless Mobile Multimedia Netw"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27767-5_24"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.160"},{"key":"ref25","article-title":"Epidemic routing for partially connected ad hoc networks","author":"vahdat","year":"2000"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/8858\/8259029\/7407631-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/8259029\/07407631.pdf?arnumber=7407631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:28Z","timestamp":1649443888000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7407631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":48,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2016.2530705","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}