{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:13:03Z","timestamp":1730301183332,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.9","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"42-49","source":"Crossref","is-referenced-by-count":9,"title":["Light-Weight Trust-Based On-Demand Multipath Routing Protocol for Mobile Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Chuanhao","family":"Qu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Ju","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Huaqiang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Longpeng","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2304"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462115"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31513-8_78"},{"journal-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"1997","key":"13"},{"key":"14","first-page":"2601","article-title":"Trust worthy architecture implementation for mobile ad hoc networks","volume":"3","author":"saravanan","year":"2011","journal-title":"International Journal on Computer Science and Engineering"},{"year":"2012","key":"11"},{"key":"12","first-page":"251","article-title":"The medium access control sublayer","author":"tanenbaum","year":"2002","journal-title":"Computer Networks"},{"journal-title":"Computer Communications","article-title":"Impact of trust model on on-demand multi-path routing in mobile ad hoc networks","year":"2012","author":"xia","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-1574-5"},{"key":"1","first-page":"80","article-title":"A dynamic trust model for mobile ad hoc networks","author":"liu","year":"2004","journal-title":"Proceedings 10th IEEE International Workshop on Future Trends Of IEEE"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992756"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33260-9_6"},{"journal-title":"Ad Hoc Networks","article-title":"Trust prediction and trust-based source routing in mobile ad hoc networks","year":"2012","author":"xia","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22200-9_26"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.2008.22"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0160"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680821.pdf?arnumber=6680821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:07:42Z","timestamp":1490227662000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680821\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.9","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}