{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:02Z","timestamp":1750307402164,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T00:00:00Z","timestamp":1277683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,28]]},"DOI":"10.1145\/1815396.1815543","type":"proceedings-article","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T13:05:15Z","timestamp":1277816715000},"page":"636-645","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["PROTECT"],"prefix":"10.1145","author":[{"given":"Udayan","family":"Kumar","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Gautam","family":"Thakur","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Ahmed","family":"Helmy","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2010,6,28]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/WCNC.2008.530"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1409944.1409957"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1653662.1653692"},{"key":"e_1_3_2_1_4_1","volume-title":"Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,\" in Proceedings of IEEE INFOCOM","author":"Zhong S.","year":"2002","unstructured":"S. Zhong , J. Chen , and R. Yang , \" Sprite: A Simple , Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,\" in Proceedings of IEEE INFOCOM , 2002 . S. Zhong, J. Chen, and R. Yang, \"Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,\" in Proceedings of IEEE INFOCOM, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/MCOM.2005.1470831"},{"unstructured":"A Robust Reputation System for Mobile Ad-hoc Networks 2003. A Robust Reputation System for Mobile Ad-hoc Networks 2003.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Cooperation in wireless ad hoc networks,\" in In Proceedings of IEEE Infocom","author":"Pavan V. S.","year":"2003","unstructured":"V. S. Pavan , V. Srinivasan , P. Nuggehalli , C. F. Chiasserini , and R. R. Rao , \" Cooperation in wireless ad hoc networks,\" in In Proceedings of IEEE Infocom , 2003 . V. S. Pavan, V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, \"Cooperation in wireless ad hoc networks,\" in In Proceedings of IEEE Infocom, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1016\/j.peva.2004.03.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/978-3-642-10406-0_18"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"COMSWARE 2007. 2nd International Conference on","author":"Panagakis A.","year":"2007","unstructured":"A. Panagakis , A. Vaios , and I. Stavrakakis , \" On the Effects of Cooperation in DTNs,\" in Communication Systems Software and Middleware, 2007 . COMSWARE 2007. 2nd International Conference on , Jan. 2007 , pp. 1 -- 6 . A. Panagakis, A. Vaios, and I. Stavrakakis, \"On the Effects of Cooperation in DTNs,\" in Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on, Jan. 2007, pp. 1--6."},{"key":"e_1_3_2_1_13_1","volume-title":"Mobile and Multimedia Networks (WoWMoM) 2007","author":"Buttyan L.","year":"2007","unstructured":"L. Buttyan , L. Dora , M. Felegyhazi , and I. Vajda , \" Barter-based cooperation in delay-tolerant personal wireless networks,\" in World of Wireless , Mobile and Multimedia Networks (WoWMoM) 2007 , 2007 . L. Buttyan, L. Dora, M. Felegyhazi, and I. Vajda, \"Barter-based cooperation in delay-tolerant personal wireless networks,\" in World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2007, 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"European Wireless Conference","author":"Michiardi P.","year":"2002","unstructured":"P. Michiardi , P. Michiardi , and R. Molva , \" Simulation-based analysis of security exposures in mobile ad hoc networks,\" in in Mobile Ad Hoc Networks . European Wireless Conference , 2002 . P. Michiardi, P. Michiardi, and R. Molva, \"Simulation-based analysis of security exposures in mobile ad hoc networks,\" in in Mobile Ad Hoc Networks. European Wireless Conference, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/345910.345955"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1006\/obhd.1996.2673"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/1555816.1555818"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1504\/IJSN.2009.023425"},{"key":"e_1_3_2_1_19_1","volume-title":"Workshop on Wireless Network Measurement (WiNMee)","author":"W.","year":"2006","unstructured":"W. jen Hsu and A. Helmy, \"On nodal encounter patterns in wireless lan traces,\" in IEEE Intl . Workshop on Wireless Network Measurement (WiNMee) , 2006 . W. jen Hsu and A. Helmy, \"On nodal encounter patterns in wireless lan traces,\" in IEEE Intl. Workshop on Wireless Network Measurement (WiNMee), 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1146\/annurev.soc.27.1.415"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1287853.1287899"},{"key":"e_1_3_2_1_22_1","volume-title":"chang Feng, and W. Hu, \"Towards trustworthy participatory sensing,\" in Proceedings of the 4th USENIX Workshop on Hot Topics in Security (HotSec","author":"Dua A.","year":"2009","unstructured":"A. Dua , N. Bulusu , W. chang Feng, and W. Hu, \"Towards trustworthy participatory sensing,\" in Proceedings of the 4th USENIX Workshop on Hot Topics in Security (HotSec 2009 ), 2009. A. Dua, N. Bulusu, W. chang Feng, and W. Hu, \"Towards trustworthy participatory sensing,\" in Proceedings of the 4th USENIX Workshop on Hot Topics in Security (HotSec 2009), 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1734583.1734592"},{"unstructured":"S. Tanachaiwiwat P. Dave R. Bhindwale and A. Helmy \"Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks \" in IEEE Workshop on Energy-Efficient Wireless Communications and Networks (EWCN) in conjunction with IEEE IPCCC 2004 pp. 14--17.  S. Tanachaiwiwat P. Dave R. Bhindwale and A. Helmy \"Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks \" in IEEE Workshop on Energy-Efficient Wireless Communications and Networks (EWCN) in conjunction with IEEE IPCCC 2004 pp. 14--17.","key":"e_1_3_2_1_25_1"}],"event":{"sponsor":["Computer and Information Society","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGDOC ACM Special Interest Group for Design of Communications"],"acronym":"IWCMC '10","name":"IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference","location":"Caen France"},"container-title":["Proceedings of the 6th International Wireless Communications and Mobile Computing Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815396.1815543","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1815396.1815543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:23Z","timestamp":1750246763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815396.1815543"}},"subtitle":["proximity-based trust-advisor using encounters for mobile societies"],"short-title":[],"issued":{"date-parts":[[2010,6,28]]},"references-count":22,"alternative-id":["10.1145\/1815396.1815543","10.1145\/1815396"],"URL":"https:\/\/doi.org\/10.1145\/1815396.1815543","relation":{},"subject":[],"published":{"date-parts":[[2010,6,28]]},"assertion":[{"value":"2010-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}