{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:42:20Z","timestamp":1725684140196},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,3]]},"DOI":"10.1109\/iccta.2007.3","type":"proceedings-article","created":{"date-parts":[[2007,4,19]],"date-time":"2007-04-19T16:38:58Z","timestamp":1177000738000},"page":"51-58","source":"Crossref","is-referenced-by-count":19,"title":["A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Jaydip","family":"Sen","sequence":"first","affiliation":[]},{"given":"Piyali Roy","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Indranil","family":"Sengupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"18","article-title":"Managing Trust in Self-Organized in Mobile Ad Hoc Networks","author":"baras","year":"2005","journal-title":"Proceedings of Network and Distributed System Security Symposium (NDSS '05) Wireless and Mobile Security Workshop"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1169075.1169081"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-006-0040-3"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.01.008"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/881978.882002"},{"key":"3","article-title":"Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks","author":"y-c","year":"2002","journal-title":"Proc MOBICOM'2002"},{"key":"2","first-page":"255","article-title":"Mitigating Routing Misbehavior in Mobile Ad Hoc Networks","author":"marti","year":"2000","journal-title":"Proceedings of MOBICOM 2000"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"10","first-page":"22","article-title":"The Strange Logic of Random Graphs","author":"spencer","year":"2000","journal-title":"Algorithms and Combinatorics"},{"key":"7","article-title":"The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks","author":"stajano","year":"1999","journal-title":"Proceedings of the 7 th International Workshop on Security Protocols LNCS 1796 Springer-Verlag"},{"key":"6","first-page":"251","article-title":"Providing Robust and Ubiquitous Security Support for Mobile As Hoc Networks","author":"kong","year":"2001","journal-title":"Proc Int Conf Network Protocols (ICNP)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"key":"4","article-title":"On Trust Establishment in Mobile Ad-Hoc Networks","author":"eshenauer","year":"2002","journal-title":"Proceedings of the Security Protocols Workshop"},{"key":"9","article-title":"A Distributed Light-weight Authentication Model for Ad Hoc Networks","author":"weimerskirch","year":"2001","journal-title":"Proceedings of the 4 International Conference on Information Security and Cryptology (ICSSC) 2001"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"}],"event":{"name":"2007 International Conference on Computing: Theory and Applications (ICCTA'07)","start":{"date-parts":[[2007,3,5]]},"location":"Kolkata, India","end":{"date-parts":[[2007,3,7]]}},"container-title":["2007 International Conference on Computing: Theory and Applications (ICCTA'07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4127325\/4127326\/04127342.pdf?arnumber=4127342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T18:35:35Z","timestamp":1489602935000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4127342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iccta.2007.3","relation":{},"subject":[],"published":{"date-parts":[[2007,3]]}}}