{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:11:14Z","timestamp":1725721874552},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/wimob.2013.6673436","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T14:45:04Z","timestamp":1386168304000},"page":"724-729","source":"Crossref","is-referenced-by-count":25,"title":["Trust-based Security Protocol against blackhole attacks in opportunistic networks"],"prefix":"10.1109","author":[{"given":"Sahil","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Sanjay Kumar","family":"Dhurandher","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]},{"given":"Arun","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Mohammed S.","family":"Obaidat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2010.41"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CONGRESS.2009.17"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1755743.1755746"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.292"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2012.95"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062170"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466696"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6006047"},{"key":"9","article-title":"Opportunistic network environment simulator","author":"keranen","year":"2008","journal-title":"Special Assignment Report"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961272"},{"key":"11","first-page":"177","article-title":"MobiID: A user-centric and social-aware reputation based incentive scheme for delay\/disruption tolerant networks","author":"wei","year":"2011","journal-title":"ADHOC-NOW"}],"event":{"name":"2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2013,10,7]]},"location":"Lyon, France","end":{"date-parts":[[2013,10,9]]}},"container-title":["2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661476\/6673317\/06673436.pdf?arnumber=6673436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T18:50:37Z","timestamp":1490208637000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6673436\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/wimob.2013.6673436","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}