{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:34Z","timestamp":1738777234680,"version":"3.37.0"},"reference-count":11,"publisher":"Academy Publisher","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.7.1738-1746","type":"journal-article","created":{"date-parts":[[2014,7,3]],"date-time":"2014-07-03T10:41:45Z","timestamp":1404384105000},"source":"Crossref","is-referenced-by-count":1,"title":["A Participation-Based Trust Model for Mobile P2P Networks"],"prefix":"10.4304","volume":"9","author":[{"given":"Kai","family":"Liu","sequence":"first","affiliation":[]},{"given":"Guang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Daheng","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Jiaming","family":"He","sequence":"additional","affiliation":[]},{"given":"Xianliang","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,7,3]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1360\/jos180157"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.48"},{"key":"ref4","volume-title":"Research on trust management technologies in open peer-to-peer environment","author":"Feng","year":"2011","unstructured":"[4] Jingyu Feng. Research on trust management technologies in open peer-to-peer environment. Xidian University, 2011."},{"issue":"1","key":"ref5","article-title":"Hai Jin. A survey on overcoming free riding in peer-to-peer networks.","volume":"31","author":"Yijiao","year":"2008","unstructured":"[6] Yijiao Yu, Hai Jin. A survey on overcoming free riding in peer-to-peer networks. Chinese Journal of Computers, 2008, 31(1).","journal-title":"Chinese Journal of Computers"},{"issue":"4","key":"ref6","first-page":"63","article-title":"Trust model based on reputation for peer-to-peer networks.","volume":"29","author":"Tian","year":"2008","unstructured":"[8] Chunqi Tian, Shihong Zhou, Wendong Wang, Shiduan Cheng. Trust model based on reputation for peer-to-peer networks. Journal on Communications. 2008, 29(4) pp. 63-70.","journal-title":"J Commun","ISSN":"https:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.04.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2008.00270"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.60"},{"key":"ref10","first-page":"2P","article-title":"PerformTrust: Trust model integrated past and current performance","volume-title":"IEEE\/ACS International Conference on Computer Systems and Applications","author":"Fu","year":"2008","unstructured":"[12] Fu J, Xiong H, Li Z, et al. PerformTrust: Trust model integrated past and current performance in P2P file sharing systems. IEEE\/ACS International Conference on Computer Systems and Applications, 2008 pp. 718-725."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2005415"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:06:52Z","timestamp":1738775212000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,3]]},"references-count":11,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2014,7,3]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.7.1738-1746","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,7,3]]}}}