{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:49:55Z","timestamp":1758635395512,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,8,28]],"date-time":"2005-08-28T00:00:00Z","timestamp":1125187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,8,28]]},"DOI":"10.1145\/1080829.1080841","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"117-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":97,"title":["On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks"],"prefix":"10.1145","author":[{"given":"Sheng","family":"Zhong","sequence":"first","affiliation":[{"name":"SUNY at Buffalo, Buffalo, NY"}]},{"given":"Li (Erran)","family":"Li","sequence":"additional","affiliation":[{"name":"Bell Laboratories, Murray Hill, NJ"}]},{"given":"Yanbin Grace","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Texas, Austin, TX"}]},{"given":"Yang (Richard)","family":"Yang","sequence":"additional","affiliation":[{"name":"Yale University, New Haven, CT"}]}],"member":"320","published-online":{"date-parts":[[2005,8,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939011"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of IEEE Globecom Internet Mini-Conference","author":"Balakrishnan H.","year":"1998","unstructured":"H. Balakrishnan and R. Katz . Explicit loss notification and wireless web performance . In Proceedings of IEEE Globecom Internet Mini-Conference , 1998 . H. Balakrishnan and R. Katz. Explicit loss notification and wireless web performance. In Proceedings of IEEE Globecom Internet Mini-Conference, 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1895489.1895541"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/514151.514164"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498536"},{"key":"e_1_3_2_1_8_1","volume-title":"Data sheet for cisco aironet","author":"Cisco Systems Inc.","year":"2004","unstructured":"Cisco Systems Inc. Data sheet for cisco aironet , 2004 . Cisco Systems Inc. Data sheet for cisco aironet, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01726210"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939000"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571856"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2001.1754"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/570810.570812"},{"key":"e_1_3_2_1_14_1","volume-title":"Incentives and Internet algorithms. Tutorial given at PODC","author":"Feigenbaum J.","year":"2003","unstructured":"J. Feigenbaum and S. Shenker . Incentives and Internet algorithms. Tutorial given at PODC 2003 . Available at http:\/\/www.cs.yale.edu\/~jf\/PODC03.ppt, July 2003. J. Feigenbaum and S. Shenker. Incentives and Internet algorithms. Tutorial given at PODC 2003. Available at http:\/\/www.cs.yale.edu\/~jf\/PODC03.ppt, July 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39867-7_70"},{"key":"e_1_3_2_1_17_1","unstructured":"GloMoSim. http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/.  GloMoSim. http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/989459.989467"},{"key":"e_1_3_2_1_19_1","volume-title":"Basic Tools","author":"Goldreich O.","year":"2001","unstructured":"O. Goldreich . Foundations of Cryptography : Volume 1 , Basic Tools . Cambridge University Press , Aug. 2001 . O. Goldreich. Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press, Aug. 2001."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2307\/1914085"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875576"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016527.1016532"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1755009.1755033"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_2"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/381591.381602"},{"key":"e_1_3_2_1_26_1","volume-title":"Game Theory and Economic Modeling","author":"Kreps D. M.","year":"1991","unstructured":"D. M. Kreps . Game Theory and Economic Modeling . Oxford Press , 1991 . D. M. Kreps. Game Theory and Economic Modeling. Oxford Press, 1991."},{"key":"e_1_3_2_1_27_1","volume-title":"Wireless and Mobile Network Architectures","author":"Lin Y.-B.","year":"2000","unstructured":"Y.-B. Lin and I. Chlamtac . Wireless and Mobile Network Architectures . John Wiley and Sons , 2000 . Y.-B. Lin and I. Chlamtac. Wireless and Mobile Network Architectures. John Wiley and Sons, 2000."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939021"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016527.1016531"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647802.737297"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352898"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1006\/game.1999.0790"},{"key":"e_1_3_2_1_34_1","volume-title":"A Course in Game Theory","author":"Osborne M. J.","year":"1994","unstructured":"M. J. Osborne and A. Rubenstein . A Course in Game Theory . The MIT Press , 1994 . M. J. Osborne and A. Rubenstein. A Course in Game Theory. The MIT Press, 1994."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380883"},{"key":"e_1_3_2_1_36_1","volume-title":"Addison-Wesley","author":"Perkins C.","year":"2000","unstructured":"C. Perkins . Ad Hoc Networking . Addison-Wesley , 2000 . C. Perkins. Ad Hoc Networking. Addison-Wesley, 2000."},{"key":"e_1_3_2_1_37_1","volume-title":"Wireless Communications: Principles and Practice","author":"Rappaport T.","year":"2001","unstructured":"T. Rappaport . Wireless Communications: Principles and Practice . Prentice Hall , 2 nd edition, Dec. 2001 . T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall, 2nd edition, Dec. 2001.","edition":"2"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/844340.844345"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778418"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208918"},{"key":"e_1_3_2_1_41_1","volume-title":"Cryptography: Theory and Practice","author":"Stinson D. R.","year":"1995","unstructured":"D. R. Stinson . Cryptography: Theory and Practice . CRC Press , 1995 . D. R. Stinson. Cryptography: Theory and Practice. CRC Press, 1995."},{"key":"e_1_3_2_1_42_1","volume-title":"Protocols and Systems","author":"Toh C.-K.","year":"2001","unstructured":"C.-K. Toh . Ad Hoc Mobile Wireless Networks : Protocols and Systems . Prentice Hall PTR , 2001 . C.-K. Toh. Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall PTR, 2001."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1961.tb02789.x"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023745"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958494"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958493"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"}],"event":{"name":"MobiCom05: 11th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Cologne Germany","acronym":"MobiCom05"},"container-title":["Proceedings of the 11th annual international conference on Mobile computing and networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080829.1080841","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1080829.1080841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:42Z","timestamp":1750263522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080829.1080841"}},"subtitle":["an integrated approach using game theoretical and cryptographic techniques"],"short-title":[],"issued":{"date-parts":[[2005,8,28]]},"references-count":46,"alternative-id":["10.1145\/1080829.1080841","10.1145\/1080829"],"URL":"https:\/\/doi.org\/10.1145\/1080829.1080841","relation":{},"subject":[],"published":{"date-parts":[[2005,8,28]]},"assertion":[{"value":"2005-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}