PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles
暂无分享,去创建一个
Mohsen Guizani | Xiaojiang Du | Liehuang Zhu | Chuan Zhang | Chang Xu | Rixin Xu | Kashif Sharif | M. Guizani | Xiaojiang Du | Liehuang Zhu | K. Sharif | Chang Xu | Chuan Zhang | Rixin Xu
[1] Feng Xia,et al. BEEINFO: Interest-Based Forwarding Using Artificial Bee Colony for Socially Aware Networking , 2015, IEEE Transactions on Vehicular Technology.
[2] Longfei Wu,et al. MobiFish: A lightweight anti-phishing scheme for mobile phones , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).
[3] Jie Wu,et al. LocalCom: A Community-based Epidemic Forwarding Scheme in Disruption-tolerant Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[4] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[5] Chin-Tser Huang,et al. Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks , 2011, Comput. Commun..
[6] Xiaojiang Du,et al. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones , 2014, IEEE Communications Magazine.
[7] Marco Conti,et al. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.
[8] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[9] Pan Hui,et al. How Small Labels Create Big Improvements , 2006, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[10] Victor C. M. Leung,et al. S-Aframe: Agent-Based Multilayer Framework With Context-Aware Semantic Service for Vehicular Social Networks , 2015, IEEE Transactions on Emerging Topics in Computing.
[11] Jörg Ott,et al. Simulating Mobility and DTNs with the ONE (Invited Paper) , 2010, J. Commun..
[12] Xiaojiang Du,et al. Achieving big data privacy via hybrid cloud , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[13] Xiaojiang Du,et al. A calculation method for social network user credibility , 2017, 2017 IEEE International Conference on Communications (ICC).
[14] Chao Zhang,et al. Routing with multi-level cross-community social groups in mobile opportunistic networks , 2013, Personal and Ubiquitous Computing.
[15] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[16] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[17] Anders Lindgren,et al. Probabilistic routing in intermittently connected networks , 2003, MOCO.
[18] Zhenyu He,et al. Robust Object Tracking via Key Patch Sparse Representation , 2017, IEEE Transactions on Cybernetics.
[19] Hongke Zhang,et al. Energy-efficient cluster management in heterogeneous vehicular networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[20] Zhenyu He,et al. Connected Component Model for Multi-Object Tracking , 2016, IEEE Transactions on Image Processing.
[21] Anna Maria Vegni,et al. A Survey on Vehicular Social Networks , 2015, IEEE Communications Surveys & Tutorials.
[22] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[23] Rongxing Lu,et al. Vehicular Ad Hoc Network Security and Privacy , 2015 .
[24] Wei Yuan,et al. Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective , 2013, IEEE Transactions on Mobile Computing.
[25] Mads Haahr,et al. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.
[26] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[27] Boleslaw K. Szymanski,et al. Friendship Based Routing in Delay Tolerant Mobile Social Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[28] Yuan Yan Tang,et al. Thinning Character Using Modulus Minima of Wavelet Transform , 2006, Int. J. Pattern Recognit. Artif. Intell..
[29] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[30] Mads Haahr,et al. Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.
[31] Lionel Brunie,et al. A delay and cost balancing protocol for message routing in mobile delay tolerant networks , 2015, Ad Hoc Networks.
[32] Nick Filer,et al. Neighbour discovery in opportunistic networks , 2015, Ad Hoc Networks.
[33] Cecilia Mascolo,et al. Writing on the clean slate: Implementing a socially-aware protocol in Haggle , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[34] Cecilia Mascolo,et al. Adaptive routing for intermittently connected mobile ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[35] Marco Conti,et al. Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution , 2008, Pervasive Mob. Comput..
[36] Yue Zhang,et al. Social vehicle swarms: a novel perspective on socially aware vehicular communication architecture , 2016, IEEE Wireless Communications.
[37] Anelise Munaretto,et al. GrAnt: Inferring best forwarders from complex networks' dynamics through a greedy Ant Colony Optimization , 2012, Comput. Networks.
[38] Hongke Zhang,et al. Improving QoS on high-speed vehicle by multipath transmission based on practical experiment , 2015, 2015 IEEE Vehicular Networking Conference (VNC).