{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:31:59Z","timestamp":1725532319201},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/csse.2008.1436","type":"proceedings-article","created":{"date-parts":[[2008,12,22]],"date-time":"2008-12-22T18:26:45Z","timestamp":1229970405000},"page":"797-801","source":"Crossref","is-referenced-by-count":9,"title":["Group-Based Trust Model in P2P System Based on Trusted Computing"],"prefix":"10.1109","author":[{"given":"Ning","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Yi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19941293"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1185209"},{"key":"16","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/DEXA.2003.1232052","article-title":"privacy and trusted computing","author":"reid","year":"2003","journal-title":"Proc 14th Int l Workshop Database and Expert Systems Applications (Dexa 03)"},{"key":"13","article-title":"trusted computing, peer-to-peer distribution, and the economics of pirated entertainment","author":"schechter","year":"2003","journal-title":"The Second Annual Workshop on Economics and Information Security (EIS '03)"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064005"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2005.40"},{"key":"3","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/COEC.2003.1210262","article-title":"a reputation-based trust model for peer-to-peer ecommerce communities","author":"xiong","year":"2003","journal-title":"2003 IEEE International Conference on E-Commerce Technology (CEC'03)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2004.34"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.124"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206960"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2003.1231515"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECCMW.2005.1588304"},{"key":"9","first-page":"108","article-title":"collaborative automated trust negotiation in peer-to-peer systems","author":"ye","year":"2004","journal-title":"Proceedings of the Fourth International Conference on Peer-to-Peer Computing (P2P '04)"},{"year":"0","key":"8"}],"event":{"name":"2008 International Conference on Computer Science and Software Engineering","start":{"date-parts":[[2008,12,12]]},"location":"Wuhan, China","end":{"date-parts":[[2008,12,14]]}},"container-title":["2008 International Conference on Computer Science and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4721667\/4722268\/04722463.pdf?arnumber=4722463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T11:01:44Z","timestamp":1497783704000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4722463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/csse.2008.1436","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}