Motivating Content Sharing and Trustworthiness in Mobile Social Networks
暂无分享,去创建一个
[1] Alvin Chin,et al. Mobile Social Networking: An Innovative Approach , 2013 .
[2] Kate Ching-Ju Lin,et al. Preference-aware content dissemination in opportunistic mobile social networks , 2012, 2012 Proceedings IEEE INFOCOM.
[3] Song Guo,et al. A Game Theoretical Incentive Scheme for Relay Selection Services in Mobile Social Networks , 2016, IEEE Transactions on Vehicular Technology.
[4] Roman Beck,et al. Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.
[5] David K. Y. Yau,et al. A game theoretic approach to provide incentive and service differentiation in P2P networks , 2004, SIGMETRICS '04/Performance '04.
[6] Kemal Bicakci,et al. Infinite length hash chains and their applications , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[7] Zhu Han,et al. Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networks , 2013, 2013 Proceedings IEEE INFOCOM.
[8] Laurence T. Yang,et al. MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] John Kelley,et al. WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.
[10] Mihaela van der Schaar,et al. A Game Theoretic Analysis of Incentives in Content Production and Sharing Over Peer-to-Peer Networks , 2009, IEEE Journal of Selected Topics in Signal Processing.
[11] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[12] Kyriakos Mouratidis,et al. Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..
[13] Hongyi Wu,et al. Incentive Mechanisms for Data Dissemination in Autonomous Mobile Social Networks , 2017, IEEE Transactions on Mobile Computing.
[14] Wei Gao,et al. Authentication of outsourced linear function query with efficient updates , 2017, Cluster Computing.
[15] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[16] Jie Wu,et al. Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..
[17] Feng Xia,et al. Safety Challenges and Solutions in Mobile Social Networks , 2013, IEEE Systems Journal.
[18] Daniele Quercia,et al. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.
[19] Gene Tsudik,et al. Authentication of Outsourced Databases Using Signature Aggregation and Chaining , 2006, DASFAA.
[20] Franck Legendre,et al. Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[21] Chih-Yu Wang,et al. Motivating content sharing in mobile social network through collective bidding , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[22] Christophe Diot,et al. Dissemination in opportunistic social networks: the role of temporal communities , 2012, MobiHoc '12.
[23] Hwee Pink Tan,et al. Profit-maximizing incentive for participatory sensing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[24] Xiaohui Liang,et al. Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks , 2022 .
[25] W. Bolt. Bitcoin and Cryptocurrency Technologies : A Comprehensive Introduction , 2017 .
[26] Charu C. Aggarwal,et al. An Introduction to Social Network Data Analytics , 2011, Social Network Data Analytics.
[27] Aiping Huang,et al. Device-to-Device Offloading with Proactive Caching in Mobile Cellular Networks , 2014, GLOBECOM 2014.
[28] Kun Yang,et al. Mobile social networks: Design requirements, architecture, and state-of-the-art technology , 2017, Comput. Commun..
[29] Yongdong Wu,et al. Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A Stackelberg Game Approach , 2014, IEEE Transactions on Mobile Computing.
[30] Pan Hui,et al. Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.
[31] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[32] Lei Chen,et al. Free Market of Crowdsourcing: Incentive Mechanism Design for Mobile Sensing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[33] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[34] Guihai Chen,et al. EndorTrust: An Endorsement-Based Reputation System for Trustworthy and Heterogeneous Crowdsourcing , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[35] Laurent Massoulié,et al. The diameter of opportunistic mobile networks , 2007, CoNEXT '07.
[36] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .