{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:41Z","timestamp":1763468081120,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/wcnc.2012.6214288","type":"proceedings-article","created":{"date-parts":[[2012,6,20]],"date-time":"2012-06-20T13:34:54Z","timestamp":1340199294000},"page":"2852-2857","source":"Crossref","is-referenced-by-count":2,"title":["Impact of mobility on trust decay rate"],"prefix":"10.1109","author":[{"given":"Dang Q.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Kunz","sequence":"additional","affiliation":[]},{"given":"Louise","family":"Lamont","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1109\/TMC.2010.44","article-title":"Uncertainty modeling and reduction in manets","volume":"9","author":"li","year":"2010","journal-title":"IEEE Trans on Mobile Computing"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.72"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258490"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680434"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2009.5384817"},{"key":"2","article-title":"A trust model for secure and qos routing in manets","volume":"1","author":"shilpa","year":"2011","journal-title":"Intl J of Innovative Technology and Creative Engineering (IJITCE)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102222"},{"key":"10","first-page":"47","article-title":"On trust establishment in mobile ad-hoc networks","author":"eschenauer","year":"2002","journal-title":"Proc of the Security Protocols Workshop"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77024-4_44"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.06.011"},{"key":"5","article-title":"Using cryptography in trust computing for networked communications","volume":"8","author":"nguyen","year":"2011","journal-title":"Intl J of Computer Science Issues (IJCSI)"},{"key":"4","article-title":"Energy based trust solution for detecting selfish nodes in manet using fuzzy logic","volume":"2","author":"vijayan","year":"2011","journal-title":"Intl J of Research and Reviews in Computer Science (IJRRCS)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2010.5663906"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/KIMAS.2005.1427054"}],"event":{"name":"2012 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2012,4,1]]},"location":"Paris, France","end":{"date-parts":[[2012,4,4]]}},"container-title":["2012 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209058\/6213907\/06214288.pdf?arnumber=6214288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T20:20:42Z","timestamp":1497990042000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6214288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2012.6214288","relation":{},"subject":[],"published":{"date-parts":[[2012,4]]}}}