[1] |
CONTI M , KUMAR M . Opportunities in opportunistic computing[J]. Computer, 2010,43(1): 42-50.
|
[2] |
SHARMA G , MAZUMDAR R , SHROFF N B . Delay and capacity trade-offs in mobile ad hoc networks:a global perspective[J]. IEEE/ACM Transactions on Networking (ToN), 2007,15(5): 981-992.
|
[3] |
陈曦, 李光松, 田有亮 ,等. 机会网络中基于社会属性的按需密钥管理方案[J]. 通信学报, 2013,34(12): 93-99. CHEN X , LI G S , TIAN Y L ,et al. On-demand key management based on social attribute for opportunistic networks[J]. Journal on Communications, 2013,34(12): 93-99.
|
[4] |
CONTI M , GIORDANO S , MAY M ,et al. From opportunistic networks to opportunistic computing[J]. Communications Magazine,IEEE, 2010,48(9): 126-139.
|
[5] |
CONTI M , DAS S K , BISDIKIAN C ,et al. Looking ahead in pervasive computing:challenges and opportunities in the era of cyber-physical convergence[J]. Pervasive and Mobile Commputing, 2012,8(1): 2-21.
|
[6] |
胡海洋, 李忠金, 胡华 ,等. 面向移动社交网络的协作式内容分发机制[J]. 计算机学报, 2013,36(3): 613-625. HU H Y , LI Z J , HU H ,et al. Cooperative contents distribution in mobile social networks[J]. Chinese Journal of Computers, 2013,36(3): 613-625.
|
[7] |
LU R , LIN X , LIANG X ,et al. A secure handshake scheme with symptoms-matching for mhealthcare social network[J]. Mobile Networks and Applications, 2011,16(6): 683-694.
|
[8] |
KAPADIA A , KOTZ D , TRIANDOPOULOS N . Opportunistic sensing:security challenges for the new paradigm[A]. First International in Communication Systems and Networks and Workshops[C]. Bangalore,India, 2009. 1-10.
|
[9] |
熊永平, 孙利民, 牛建伟 ,等. 机会网络[J]. 软件学报, 2009,20(1): 124-137. XIONG Y P , SUN L M , NIU J W ,et al. Opportunistic networks[J]. Journal of Software, 2009,20(1): 124-137.
|
[10] |
徐佳, 孙力娟, 王汝传 ,等. 机会网络中基于种子喷雾的自适应路由协议[J]. 电子学报, 2010,38(10): 2315-2321. XU J , SUN L J , WANG R C ,et al. Adaptive seed spay routing for opportunistic networks[J]. Acta Electronic Sinica, 2010,38(10): 2315-2321.
|
[11] |
WANG X , CHENG W , MOHAPATRA P ,et al. Enabling reputation and trust in privacy-preserving mobile sensing[J]. IEEE Transactions on Mobile Computing, 2014,13(12): 2777-2790.
|
[12] |
ZHANG R , ZHANG J , ZHANG Y ,et al. Privacy-preserving profile matching for proximity-based mobile social networking[J]. IEEE Journal on Selected Areas in Communications, 2013,31(9): 656-668.
|
[13] |
LI M , CAO N , YU S ,et al. FindU:privacy-preserving personal profile matching in mobile social networks[A]. INFOCOM[C]. Shanghai,China, 2011. 2435-2443.
|
[14] |
FREEDMAN M J , NISSIM K , PINKAS B . Efficient private matching and set intersection[A]. Cryptology-EUROCRYPT 2004[C]. Interlaken,Switzerland, 2004. 1-19.
|
[15] |
DONG C , CHEN L . A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining[M]. Knowledge Discovery and Data Mining,Springer International Publishing, 2014.
|
[16] |
ZHU X , CHEN Z , CHI H ,et al. Two-party and multi-party private matching for proximity-based mobile social networks[A]. IEEE International Conference on Communications (ICC)[C]. Sydney,Australia, 2014. 926-931.
|
[17] |
LU R , LIN X , SHEN X . SPOC:a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,24(3): 614-624.
|
[18] |
LIAO X , ULUAGAC S , BEYAH R A . S-match:verifiable privacy-preserving profile matching for mobile social services[A]. The 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)[C]. Atlanta,USA, 2014. 287-298.
|
[19] |
HUANG K H , CHUNG Y F , LIU C H ,et al. Efficient migration for mobile computing in distributed networks[J]. Computer Standards &Interfaces, 2009,31(1): 40-47.
|
[20] |
LU R , LIN X , SHI Z ,et al. PLAM:a privacy-preserving framework for local-area mobile social networks[A]. INFOCOM[C]. Toronto,Canada, 2014. 763-771.
|
[21] |
KAYASTHA N , NIYATO D , WANG P ,et al. Applications,architectures,and protocol design issues for mobile social networks:a survey[J]. Proceedings of the IEEE, 2011,99(12): 2130-2158.
|