{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:20Z","timestamp":1750308800105,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,21]],"date-time":"2009-06-21T00:00:00Z","timestamp":1245542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,21]]},"DOI":"10.1145\/1582379.1582386","type":"proceedings-article","created":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T13:38:06Z","timestamp":1249393086000},"page":"26-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Dynamic trust establishment in emergency ad hoc networks"],"prefix":"10.1145","author":[{"given":"Christos","family":"Papageorgiou","sequence":"first","affiliation":[{"name":"University of Patras, Greece"}]},{"given":"Konstantinos","family":"Birkos","sequence":"additional","affiliation":[{"name":"University of Patras, Greece"}]},{"given":"Tasos","family":"Dagiuklas","sequence":"additional","affiliation":[{"name":"Systems and Networks, TEI of Mesolonghi, Nafpaktos, Greece"}]},{"given":"Stavros","family":"Kotsopoulos","sequence":"additional","affiliation":[{"name":"University of Patras, Greece"}]}],"member":"320","published-online":{"date-parts":[[2009,6,21]]},"reference":[{"volume-title":"Proc. of the IEEE GLOBECOM","year":"2003","author":"Bobba R. B.","key":"e_1_3_2_1_1_1"},{"volume-title":"IEEE Special Issues on Cryptography and Security","year":"2006","author":"Cagalj M.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778422"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"e_1_3_2_1_7_1","first-page":"342","volume-title":"Symp. on Applications and the Internet Workshops","author":"Khalili A.","year":"2003"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Kong P. Zerfos H. Luo S. Lu L. Zhang Providing robust and ubiquitous security support for mobile ad-hoc networks Int'l Conf. on Network Protocols pp. 251--260 2001. J. Kong P. Zerfos H. Luo S. Lu L. Zhang Providing robust and ubiquitous security support for mobile ad-hoc networks Int'l Conf. on Network Protocols pp. 251--260 2001.","DOI":"10.1109\/ICNP.2001.992905"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.v6:3"},{"key":"e_1_3_2_1_10_1","unstructured":"The NS-2 Simulator http:\/\/www.isi.edu\/nsnam\/ns\/. The NS-2 Simulator http:\/\/www.isi.edu\/nsnam\/ns\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.v7:10"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.01.008"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTA.2007.3"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080799"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216371"},{"key":"e_1_3_2_1_16_1","first-page":"479","volume-title":"7th IEEE Int'l Conf. on Computer and Information Technology","author":"Wang G.","year":"2007"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.58"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"}],"event":{"name":"IWCMC '09: 2009 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery","Wiley-Blackwell","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Leipzig Germany","acronym":"IWCMC '09"},"container-title":["Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582386","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1582379.1582386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:25:57Z","timestamp":1750278357000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1582379.1582386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,21]]},"references-count":18,"alternative-id":["10.1145\/1582379.1582386","10.1145\/1582379"],"URL":"https:\/\/doi.org\/10.1145\/1582379.1582386","relation":{},"subject":[],"published":{"date-parts":[[2009,6,21]]},"assertion":[{"value":"2009-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}