{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T06:37:01Z","timestamp":1726209421294},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,28]]},"DOI":"10.1145\/1161289.1161308","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T18:04:00Z","timestamp":1161194640000},"page":"105-113","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks"],"prefix":"10.1145","author":[{"given":"Kevin","family":"Kane","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin, TX"}]},{"given":"James C.","family":"Browne","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX"}]}],"member":"320","published-online":{"date-parts":[[2006,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095816"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094549.1094559"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems","author":"Buchegger S.","year":"2004","unstructured":"S. Buchegger and J.-Y. Le Boudec . A robust reputation system for P2P and mobile ad-hoc networks . In Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems , 2004 . S. Buchegger and J.-Y. Le Boudec. A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1162\/105864001300122476"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1126398"},{"key":"e_1_3_2_1_7_1","volume-title":"Australasian Information Security Workshop","author":"J\u00f8sang A.","year":"2006","unstructured":"A. J\u00f8sang , D. Gollmann , and R. Au . A method for access authorisation through delegation networks . In Australasian Information Security Workshop , 2006 . A. J\u00f8sang, D. Gollmann, and R. Au. A method for access authorisation through delegation networks. In Australasian Information Security Workshop, 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1239776.1239778"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Asia-Pacific Conference of Conceptual Modelling (APCCM)","author":"J\u00f8sang A.","year":"2005","unstructured":"A. J\u00f8sang and S. Pope . Semantic constraints for trust transitivity. In S. Hartmann and M. Stumptner, editors , Proceedings of the Asia-Pacific Conference of Conceptual Modelling (APCCM) , Feb 2005 . A. J\u00f8sang and S. Pope. Semantic constraints for trust transitivity. In S. Hartmann and M. Stumptner, editors, Proceedings of the Asia-Pacific Conference of Conceptual Modelling (APCCM), Feb 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2004.1286829"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/647802.737297"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759008.1759026"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_16_1","first-page":"130","volume-title":"Proceedings of SympoTIC '03","author":"Yau P.-W.","year":"2003","unstructured":"P.-W. Yau and C. J. Mitchell . Reputation methods for routing security for mobile ad hoc networks . In Proceedings of SympoTIC '03 , pages 130 -- 137 , Oct 2003 . P.-W. Yau and C. J. Mitchell. Reputation methods for routing security for mobile ad hoc networks. In Proceedings of SympoTIC '03, pages 130--137, Oct 2003."}],"event":{"name":"DIWANS06: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks 2006","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Los Angeles California","acronym":"DIWANS06"},"container-title":["Proceedings of the 5th ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161289.1161308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T14:16:43Z","timestamp":1673187403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161289.1161308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,28]]},"references-count":16,"alternative-id":["10.1145\/1161289.1161308","10.1145\/1161289"],"URL":"https:\/\/doi.org\/10.1145\/1161289.1161308","relation":{},"subject":[],"published":{"date-parts":[[2006,9,28]]},"assertion":[{"value":"2006-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}