{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:15:40Z","timestamp":1725862540931},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319428352"},{"type":"electronic","value":"9783319428369"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42836-9_20","type":"book-chapter","created":{"date-parts":[[2016,8,3]],"date-time":"2016-08-03T02:30:38Z","timestamp":1470191438000},"page":"219-230","source":"Crossref","is-referenced-by-count":0,"title":["ESRS: An Efficient and Secure Relay Selection Algorithm for Mobile Social Networks"],"prefix":"10.1007","author":[{"given":"Xiaoshuang","family":"Xing","sequence":"first","affiliation":[]},{"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Shengrong","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hongbin","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"key":"20_CR1","unstructured":"Li, J., Cai, Z., Yan, M., Li, Y.: Using crowdsourced data in location-based social netowrks to explore influence maximization. In: IEEE INFOCOM (2016)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"He, Z., Cai, Z., Wang, X.: Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In: IEEE ICDCS, pp. 205\u2013214 (2015)","DOI":"10.1109\/ICDCS.2015.29"},{"key":"20_CR3","unstructured":"Vahdat, A., Becker, D.: Epidemic routing for partially-connected ad hoc networks. Duke University, Technical Report (2000)"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Wu, J., Wang, Y.: Social feature-based multi-path routing in delay tolerant networks. In: Proceedings of the IEEE INFOCOM, pp. 1368\u20131376 (2012)","DOI":"10.1109\/INFCOM.2012.6195500"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Erramilli, V., Crovella, M., Chaintreau, A., Diot, C.: Delegation forwarding. In: Proceedings of the MobiHoc, pp. 251\u2013260 (2008)","DOI":"10.1145\/1374618.1374653"},{"issue":"1","key":"20_CR6","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/TNET.2007.897964","volume":"16","author":"T Spyropoulos","year":"2008","unstructured":"Spyropoulos, T., Psounis, K., Raghavendra, C.: Efficient routing in intermittently connected mobile networks: The multiple-copy case. IEEE\/ACM Trans. Networking 16(1), 77\u201390 (2008)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Ciobanu, R., Dobre, C., Cristea, V.: Sprint: Social prediction-based opportunistic routing. In: IEEE WoWMoM, pp. 1\u20137, June 2013","DOI":"10.1109\/WoWMoM.2013.6583442"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Moreira, W., Mendes, P., Sargento, S.: Opportunistic routing based on daily routines. In: IEEE WoWMoM, pp. 1\u20136, June 2012","DOI":"10.1109\/WoWMoM.2012.6263749"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","first-page":"20","volume-title":"Wireless Algorithms, Systems, and Applications","author":"S Wang","year":"2012","unstructured":"Wang, S., Liu, M., Cheng, X., Li, Z., Huang, J., Chen, B.: HERO \u2013 a home based routing in pocket switched networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds.) WASA 2012. LNCS, vol. 7405, pp. 20\u201330. Springer, Heidelberg (2012)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Wu, J., Xiao, M., Huang, L.: Homing spread: Community home-based multi-copy routing in mobile social networks. In: Proceedings of the IEEE INFOCOM, pp. 2319\u20132327 (2013)","DOI":"10.1109\/INFCOM.2013.6567036"},{"issue":"2","key":"20_CR11","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/s11276-015-0984-2","volume":"22","author":"SK Kim","year":"2015","unstructured":"Kim, S.K., Yoon, J.H., Lee, J.Y., Jang, G.Y., Yang, S.B.: A cooperative forwarding scheme for social preference-based selfishness in mobile social networks. Wirel. Netw. 22(2), 537\u2013552 (2015)","journal-title":"Wirel. Netw."},{"issue":"9","key":"20_CR12","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCOM.2014.6894451","volume":"52","author":"X Xing","year":"2014","unstructured":"Xing, X., Jing, T., Zhou, W., Cheng, X., Huo, Y., Liu, H.: Routing in user-centric networks. IEEE Commun. Mag. 52(9), 44\u201351 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"20_CR13","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.comnet.2016.03.016","volume":"102","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Cai, Z., Yin, G., Gao, Y., Tong, X., Wu, G.: An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput. Netw. 102, 157\u2013171 (2016)","journal-title":"Comput. Netw."},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-31869-6_3","volume-title":"Wireless Algorithms, Systems, and Applications","author":"W Cheng","year":"2012","unstructured":"Cheng, W., Wu, D., Cheng, X., Chen, D.: Routing for information leakage reduction in multi-channel multi-hop ad-hoc social networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds.) WASA 2012. LNCS, vol. 7405, pp. 31\u201342. Springer, Heidelberg (2012)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Li, W., Cheng, X., Jing, T., Xing, X.: Cooperative multi-hop relaying via network formation games in cognitive radio networks. In: IEEE INFOCOM (2013)","DOI":"10.1109\/INFCOM.2013.6566886"},{"key":"20_CR16","unstructured":"Jackson, M.O.: A survey of models of network formation: Stability and efficiency (2003)"},{"key":"20_CR17","doi-asserted-by":"crossref","first-page":"1783","DOI":"10.1038\/srep01783","volume":"3","author":"L Muchnik","year":"2013","unstructured":"Muchnik, L., Pei, S., Parra, L.C., Reis, S.D.S., Andrade, J.S., Havlin, S., Makse, H.A.: Origins of power-law degree distribution in the heterogeneity of human activity in social networks. Sci. Rep. 3, 1783 (2013)","journal-title":"Sci. Rep."},{"key":"20_CR18","unstructured":"Parris, I., Abdesslem, B.: Crawdad trace\/social network analysis\/st_andrews\/locshare\/2010\/sta1 . Downloaded from http:\/\/crawdad.org\/\/download\/st_andrews\/locshare\/locshare-StA1.tar.gz"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42836-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T02:57:55Z","timestamp":1568257075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42836-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319428352","9783319428369"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42836-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}