{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:27Z","timestamp":1750221267259,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T00:00:00Z","timestamp":1511222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Funda\u00e7\u00e3o Calouste Gulbenkian","award":["129772"],"award-info":[{"award-number":["129772"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UID\/CEC\/50021\/2013"],"award-info":[{"award-number":["UID\/CEC\/50021\/2013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,21]]},"DOI":"10.1145\/3127540.3127573","type":"proceedings-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T13:36:37Z","timestamp":1510752997000},"page":"289-293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["REPSYS"],"prefix":"10.1145","author":[{"given":"Naercio","family":"Magaia","sequence":"first","affiliation":[{"name":"INESC-ID &amp; Universidade de Lisboa, Lisbon, Portugal"}]},{"given":"Paulo","family":"Pereira","sequence":"additional","affiliation":[{"name":"INESC-ID &amp; Universidade de Lisboa, Lisbon, Portugal"}]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"INESC-ID &amp; Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2017,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.160"},{"key":"e_1_3_2_1_2_1","volume-title":"P2PEcon","author":"Buchegger Sonja","year":"2004","unstructured":"Sonja Buchegger and Jean-Yves Le Boudec . 2004. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks . In P2PEcon 2004 . http:\/\/infoscience. epfl.ch\/record\/519 Sonja Buchegger and Jean-Yves Le Boudec. 2004. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In P2PEcon 2004. http:\/\/infoscience. epfl.ch\/record\/519"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2425357"},{"key":"e_1_3_2_1_4_1","volume-title":"The Oxford Handbook of Probability and Philosophy, Alan H\u00e1jek and Christopher Hitchcock (Eds.)","author":"Dietrich Franz","year":"1996","unstructured":"Franz Dietrich and Christian List . 2016. Probabilistic Opinion Pooling . In The Oxford Handbook of Probability and Philosophy, Alan H\u00e1jek and Christopher Hitchcock (Eds.) . Oxford University Press , Chapter 25, 832. https:\/\/global.oup.com\/academic\/product\/ the-oxford-handbook-of-probability-and-philosophy-9780 1996 07617?cc=pt Franz Dietrich and Christian List. 2016. Probabilistic Opinion Pooling. In The Oxford Handbook of Probability and Philosophy, Alan H\u00e1jek and Christopher Hitchcock (Eds.). Oxford University Press, Chapter 25, 832. https:\/\/global.oup.com\/academic\/product\/ the-oxford-handbook-of-probability-and-philosophy-9780199607617?cc=pt"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Fourth Nordic Workshop on Secure Computer Systems (NORDSEC'99)","author":"Josang Audun","year":"1999","unstructured":"Audun Josang . 1999 . Trust-based decision making for electronic transactions . In Proceedings of the Fourth Nordic Workshop on Secure Computer Systems (NORDSEC'99) . 496--502. Audun Josang. 1999. Trust-based decision making for electronic transactions. In Proceedings of the Fourth Nordic Workshop on Secure Computer Systems (NORDSEC'99). 496--502."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041911.00093"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.01.018"},{"key":"e_1_3_2_1_10_1","volume-title":"Paulo Rog\u00e9rio Pereira, and Miguel Pupo Correia","author":"Magaia Naercio","year":"2017","unstructured":"Naercio Magaia , Carlos Borrego , Paulo Rog\u00e9rio Pereira, and Miguel Pupo Correia . 2017 . PRIVO : A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks. In IFIP Networking . 1--9. http:\/\/dl.ifip.org\/db\/conf\/ networking\/networking2017\/1570333245.pdf Naercio Magaia, Carlos Borrego, Paulo Rog\u00e9rio Pereira, and Miguel Pupo Correia. 2017. PRIVO: A PRIvacy-preserVing Opportunistic routing protocol for Delay Tolerant Networks. In IFIP Networking. 1--9. http:\/\/dl.ifip.org\/db\/conf\/ networking\/networking2017\/1570333245.pdf"},{"key":"e_1_3_2_1_11_1","volume-title":"Paulo Rog\u00e9rio Pereira, and Miguel P. Correia","author":"Magaia Naercio","year":"2015","unstructured":"Naercio Magaia , Paulo Rog\u00e9rio Pereira, and Miguel P. Correia . 2015 . Security in Delay-Tolerant Mobile Cyber Physical Applications. In Cyber-Physical Systems: From Theory to Practice, Danda B. Rawat, Joel J. P. C. Rodrigues, and Ivan Stojmenovic (Eds.). CRC Press , Chapter 15, 373--394. DOI:https: \/\/doi.org\/10.1201\/b19290--22 10.1201\/b19290--22 Naercio Magaia, Paulo Rog\u00e9rio Pereira, and Miguel P. Correia. 2015. Security in Delay-Tolerant Mobile Cyber Physical Applications. In Cyber-Physical Systems: From Theory to Practice, Danda B. Rawat, Joel J. P. C. Rodrigues, and Ivan Stojmenovic (Eds.). CRC Press, Chapter 15, 373--394. DOI:https: \/\/doi.org\/10.1201\/b19290--22"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"SUCCESS: A secure user-centric and social-aware reputation based incentive scheme for DTNs","volume":"19","author":"Wei Lifei","year":"2013","unstructured":"Lifei Wei , Haojin Zhu , Zhenfu Cao , and Xuemin Shen . 2013 . SUCCESS: A secure user-centric and social-aware reputation based incentive scheme for DTNs . Ad-Hoc and Sensor Wireless Networks 19 , 1 -- 2 (2013), 95--118. DOI:https: \/\/doi.org\/10.1007\/978--3--642--22450--8_14 10.1007\/978--3--642--22450--8_14 Lifei Wei, Haojin Zhu, Zhenfu Cao, and Xuemin Shen. 2013. SUCCESS: A secure user-centric and social-aware reputation based incentive scheme for DTNs. Ad-Hoc and Sensor Wireless Networks 19, 1--2 (2013), 95--118. DOI:https: \/\/doi.org\/10.1007\/978--3--642--22450--8_14","journal-title":"Ad-Hoc and Sensor Wireless Networks"}],"event":{"name":"MSWiM '17: 20th ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Miami Florida USA","acronym":"MSWiM '17"},"container-title":["Proceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3127540.3127573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3127540.3127573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:00Z","timestamp":1750212660000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3127540.3127573"}},"subtitle":["A Robust and Distributed Reputation System for Delay-Tolerant Networks"],"short-title":[],"issued":{"date-parts":[[2017,11,21]]},"references-count":11,"alternative-id":["10.1145\/3127540.3127573","10.1145\/3127540"],"URL":"https:\/\/doi.org\/10.1145\/3127540.3127573","relation":{},"subject":[],"published":{"date-parts":[[2017,11,21]]},"assertion":[{"value":"2017-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}