[1] |
PEDHADIYA M K , JHA R K , BHATT H G . Device to device communication:A survey[J]. Journal of Network and Computer Applications, 2019,129: 71-89.
|
[2] |
WU D , ZHOU L , CAI Y . Social-aware rate based content sharing mode selection for D2D content sharing scenarios[J]. IEEE Transactions on Multimedia, 2017,19(11): 2571-2582.
|
[3] |
JIANG J , ZHANG S , LI B ,et al. Maximized cellular traffic offloading via device-to-device content sharing[J]. IEEE Journal on Selected Areas in Communications, 2016,34(1): 82-91.
|
[4] |
MILITANO L , ARANITI G , CONDOLUCI M ,et al. Device-to-device communications for 5G internet of things[J]. EAI Endorsed Transactions on Internet of Things, 2015,15(1): 1-15.
|
[5] |
ZHANG A , CHEN J , HU R Q ,et al. SeDS:secure data sharing strategy for D2D communication in LTE-advanced networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(4): 2659-2672.
|
[6] |
YU T , ZHOU Z , ZHANG D ,et al. Indapson:an incentive data plan sharing system based on self-organizing network[C]// IEEE Conference on Computer Communications. 2014: 1545-1553.
|
[7] |
HE J Z , WANG H B , ZHANG T . Incentive and selection for D2D content sharing:a comprehensive scoring mechanism[C]// 2016 IEEE 13th International Conference on Signal Processing (ICSP). 2016: 1208-1213.
|
[8] |
ZHOU R F , HWANG K . PowerTrust:a robust and scalable reputation system for trusted peer-to-peer computing[C]// IEEE Transactions on Parallel and Distributed Systems. 2007: 460-473.
|
[9] |
华佳烽, 李凤华, 郭云川 ,等. 信息交换过程中的隐私保护技术研究[J]. 网络与信息安全学报, 2016,2(3): 28-38.
|
|
HUA J W , LI F H , GUO Y C ,et al. Research on privacy protection technology in information exchange process[J]. Journal of Network and Information Security, 2016,2(3): 28-38.
|
[10] |
WISHART R , HENRICKSEN K , INDULSKA J . Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system[C]// International Conference on Ubiquitous Intelligence and Computing. 2007: 929-940.
|
[11] |
FRANZ E , SPRINGER T , HARDER N . Enhancing privacy in social applications with the notion of group context[C]// 2012 International Conference for Internet Technology and Secured Transactions. 2012: 112-118.
|
[12] |
WANG M , YAN Z . Privacy-preserving authentication and key agreement protocols for D2D group communications[J]. IEEE Transactions on Industrial Informatics, 2018,14(8): 3637-3647.
|
[13] |
MOHSENI-EJIYEH A , ASHOURI-TALOUKI M , MAHDAVI M . A lightweight and secure data sharing protocol for D2D communications[C]// 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). 2017: 42-47.
|
[14] |
ZHANG A , WANG L , YE X ,et al. Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems[J]. IEEE Transactions on Information Forensics and Security, 2017,12(3): 662-675.
|
[15] |
YAN J , WU D , WANG R . Socially aware trust framework for multimedia delivery in D2D cooperative communication[J]. IEEE Transactions on Multimedia, 2019,21(3): 625-635.
|
[16] |
HE J , WANG H , CHU X ,et al. Incentive mechanism and content provider selection for device-to-device-based content sharing[J]. IEEE Transactions on Vehicular Technology, 2019.
|
[17] |
JAMEEL F , HAMID Z , JABEEN F ,et al. A survey of device-to-device communications:research issues and challenges[J]. IEEE Communications Surveys & Tutorials, 2018,20(3): 2133-2168.
|
[18] |
JENSEN C D , KORSGAARD T R . Dynamics of trust evolution:auto-configuration of dispositional trust dynamics[C]// International Conference on Security and Cryptography. 2008: 509-517.
|
[19] |
BAI B , WANG L , HAN Z ,et al. Caching based socially-aware D2D communications in wireless content delivery networks:a hypergraph framework[J]. IEEE Wireless Communications, 2016,23(4): 74-81.
|
[20] |
JING L , NG M K , HUANG J Z . An entropy weighting k-means algorithm for subspace clustering of high-dimensional sparse data[J]. IEEE Transactions on Knowledge & Data Engineering, 2007(8): 1026-1041.
|
[21] |
张近乐, 任杰 . 熵理论中熵及熵权计算式的不足与修正[J]. 统计与信息论坛, 2011,26(1): 3-5.
|
|
ZHANG J L , REN J . The deficiencies and amendments of the calculation formulate of entropy and entropy weight in the theory of entropy[J]. Statistics & Information Forum, 2011,26(1): 3-5.
|
[22] |
JIN B , JIANG D , XIONG J ,et al. D2D data privacy protection mechanism based on reliability and homomorphic encryption[J]. IEEE Access, 2018,6: 51140-51150.
|