{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:45:00Z","timestamp":1750747500612},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wcnc.2003.1200610","type":"proceedings-article","created":{"date-parts":[[2004,1,24]],"date-time":"2004-01-24T04:33:03Z","timestamp":1074918783000},"page":"1510-1515","source":"Crossref","is-referenced-by-count":15,"title":["Reputation propagation and agreement in mobile ad-hoc networks"],"prefix":"10.1109","volume":"3","author":[{"family":"Yanbin Liu","sequence":"first","affiliation":[]},{"given":"Y.R.","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.773057"},{"journal-title":"PGP user's guide","year":"1994","author":"zimmermann","key":"17"},{"journal-title":"Collaborative Reputation Mechanisms for Online Communities","year":"1999","author":"zacharia","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/35.894385"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"13","article-title":"Simulation-based analysis of security exposures in mobile ad hoc networks","author":"michiardi","year":"2002","journal-title":"European Wireless 2002 Conference"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904773"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.75.1226"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/BF03160228"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.2307\/2034984"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1007\/0-387-32792-4","author":"seneta","year":"1981","journal-title":"Non-Negative Matrices and Markov Chains"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1145\/285237.285260","article-title":"Secure group communications using key graphs","author":"wong","year":"1998","journal-title":"Proceedings of ACM SIGCOMM '98"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383062"},{"journal-title":"Matrix Analysis","year":"1995","author":"horn","key":"26"},{"journal-title":"A First Course in Stochastic Processes","year":"1975","author":"karlin","key":"27"},{"key":"28","first-page":"431","article-title":"Optimum transmission radii for packet radio networks or why six is a magic number","author":"kleinrock","year":"1978","journal-title":"IEEE National Telecommunications Conference"},{"journal-title":"The Number of Neighbors Needed for Connectivity of Wireless Networks","year":"2002","author":"xue","key":"29"},{"journal-title":"Ad Hoc Mobile Wireless Networks Protocols and Systems","year":"2001","author":"toh","key":"3"},{"journal-title":"Ad Hoc Networking","year":"2000","author":"perkins","key":"2"},{"key":"10","article-title":"Cooperative routing in mobile ad-hoc networks: Current efforts against malice and selfishness","author":"buchegger","year":"2002","journal-title":"Proceedings of Mobile Internet Workshop Informatik 2002"},{"key":"1","article-title":"Coordination of groups of mobile autonomous agents using nearest neighbor rules","author":"jadbabaie","year":"2001","journal-title":"IEEE Control and Decision Conference"},{"journal-title":"Parallel and Distributed Computation Numerical Methods","year":"1997","author":"bertsekas","key":"30"},{"key":"7","article-title":"Stimulating cooperation in self-organizing mobile ad hoc networks","author":"buttyan","year":"2002","journal-title":"ACM Journal For Mobile Networks (MONET) Special Issue On Mobile Ad Hoc Networks"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"journal-title":"Distributed Algorithms","year":"1996","author":"lynch","key":"32"},{"key":"5","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proceedings of The Sixth International Conference on Mobile Computing and Networking 2000"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959899"},{"key":"9","article-title":"Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks","author":"buchegger","year":"2002","journal-title":"Proceedings of IEEE\/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC) IEEE"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2002.994321"}],"event":{"name":"WCNC 2003 - IEEE Wireless Communications and Networking Conference","acronym":"WCNC-03","location":"New Orleans, LA, USA"},"container-title":["2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8546\/27030\/01200610.pdf?arnumber=1200610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:18:15Z","timestamp":1497583095000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1200610\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2003.1200610","relation":{},"subject":[]}}