{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:59:20Z","timestamp":1772301560361,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6-7","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972136"],"award-info":[{"award-number":["61972136"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11265-024-01918-7","type":"journal-article","created":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T06:01:47Z","timestamp":1716789707000},"page":"369-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Self-Organizing Key Security Management Algorithm in Socially Aware Networking"],"prefix":"10.1007","volume":"96","author":[{"given":"Zhang","family":"Xuemin","sequence":"first","affiliation":[]},{"given":"Deng","family":"Haitao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4467-9599","authenticated-orcid":false,"given":"Xiong","family":"Zenggang","sequence":"additional","affiliation":[]},{"given":"Rao","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Yanchao","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Hou","family":"Delin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"issue":"3","key":"1918_CR1","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1109\/JSYST.2013.2281262","volume":"9","author":"F Xia","year":"2013","unstructured":"Xia, F., Liu, L., Li, J., Ma, J., et al. (2013). Socially aware networking: A survey. IEEE Systems Journal, 9(3), 904\u2013921.","journal-title":"IEEE Systems Journal"},{"key":"1918_CR2","volume-title":"Delay tolerant network","author":"A Galati","year":"2010","unstructured":"Galati, A. (2010). Delay tolerant network. Delay Tolerant Network."},{"key":"1918_CR3","volume-title":"Opportunity network routing algorithm","author":"J Sun","year":"2013","unstructured":"Sun, J. (2013). Opportunity network routing algorithm. Posts and Telecommunications Press."},{"issue":"jan.","key":"1918_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.ress.2017.08.001","volume":"169","author":"S Xiang","year":"2018","unstructured":"Xiang, S., & Yang, J. (2018). Performance reliability evaluation for mobile ad hoc networks. Reliability Engineering & System Safety, 169(jan.), 32\u201339.","journal-title":"Reliability Engineering & System Safety"},{"key":"1918_CR5","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.future.2019.02.033","volume":"96","author":"X Fang","year":"2019","unstructured":"Fang, X., Qiong, X., Xiong, Z., Xiao, N., Xie, Y., Deng, M., & Hao, H. (2019). Intelligent distributed routing scheme based on social similarity for mobile social networks. Future Generation Computer Systems, 96, 472\u2013480.","journal-title":"Future Generation Computer Systems"},{"issue":"11","key":"1918_CR6","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1007\/s11265-022-01768-1","volume":"94","author":"X Zenggang","year":"2022","unstructured":"Zenggang, X., Xiang, L., Xueming, Z., Zhu Sanyuan, X., Fang, Z. X., Yunyun, W., & Mingyang, Z. (2022). A service pricing-based two-stage incentive algorithm for socially aware networks. Journal of Signal Processing Systems, 94(11), 1227\u20131242.","journal-title":"Journal of Signal Processing Systems"},{"issue":"5","key":"1918_CR7","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/TC.2015.2470247","volume":"65","author":"Y Li","year":"2015","unstructured":"Li, Y., Dai, W., et al. (2015). Privacy protection for preventing data over-collection in smart city. IEEE Transactions on Computers, 65(5), 1339\u20131350.","journal-title":"IEEE Transactions on Computers"},{"key":"1918_CR8","doi-asserted-by":"publisher","DOI":"10.1201\/9781351006620","volume-title":"Reinforcement learning for cyber-physical systems: with cybersecurity case studies","author":"C Li","year":"2019","unstructured":"Li, C., & Qiu, M. (2019). Reinforcement learning for cyber-physical systems: with cybersecurity case studies. Chapman and Hall\/CRC."},{"key":"1918_CR9","doi-asserted-by":"crossref","unstructured":"Qiu, M., & Qiu, H. (2020). Review on image processing based adversarial example defenses in computer vision. 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (Big Data Security), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (pp. 94\u201399). IEEE.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00027"},{"key":"1918_CR10","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Pan, M., Just, H. A., et al. (2023). Narcissus: A practical clean-label backdoor attack with limited information (pp. 771\u2013785). Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security.","DOI":"10.1145\/3576915.3616617"},{"key":"1918_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3364016","author":"J Zhang","year":"2024","unstructured":"Zhang, J., Li, H., Xu, D., Lou, Y., Ran, M., Jin, Z., & Huang, Y. (2024). Decouple and decorrelate: A disentanglement security framework combing sample weighting for cross-institution biased disease diagnosis. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2024.3364016","journal-title":"IEEE Internet of Things Journal"},{"issue":"21","key":"1918_CR12","first-page":"138","volume":"31","author":"C Ji","year":"2005","unstructured":"Ji, C., Yang, X., Hu, Y., et al. (2005). Intrusion tolerance CA scheme combining two-party sharing with (t, n) threshold scheme. Computer Engineering, 31(21), 138\u2013139.","journal-title":"Computer Engineering"},{"key":"1918_CR13","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., et al. (1995). Proactive secret sharing or: How to cope with perpetual leakage. Advances in Cryptology\u2013CRYPT0\u201995: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27\u201331, 1995 Proceedings 15 (pp. 339\u2013352). Berlin, Heidelberg: Springer.","DOI":"10.1007\/3-540-44750-4_27"},{"key":"1918_CR14","first-page":"251","volume-title":"Proceedings Ninth International Conference on Network Protocols. ICNP 2001","author":"J Kong","year":"2001","unstructured":"Kong, J., Petros, Z., Luo, H., Lu, S., & Zhang, L. (2001). Providing robust and ubiquitous security support for mobile ad-hoc networks. Proceedings Ninth International Conference on Network Protocols. ICNP 2001 (pp. 251\u2013260). IEEE."},{"key":"1918_CR15","first-page":"548","volume-title":"ISCC","author":"H Luo","year":"2002","unstructured":"Luo, H., Zerfos, P., Kong, J., Lu, S., & Zhang, L. (2002). Self-securing ad hoc wireless networks. ISCC (Vol. 2, pp. 548\u2013555). Citeseer."},{"key":"1918_CR16","first-page":"438","volume-title":"2010 Second Pacific-Asia Conference on Circuits, Communications and System","author":"J Li","year":"2010","unstructured":"Li, J., Liu, Q., Wang, A., Zhao, C., & Lin, L. (2010). Study on the distributed key generation algorithm in mobile ad-hoc networks. 2010 Second Pacific-Asia Conference on Circuits, Communications and System (Vol. 1, pp. 438\u2013441). IEEE."},{"key":"1918_CR17","doi-asserted-by":"crossref","unstructured":"Seth, A., & Keshav, S. (2005). Practical security for disconnected nodes. 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec) (pp. 31\u201336). IEEE.","DOI":"10.1109\/NPSEC.2005.1532050"},{"key":"1918_CR18","doi-asserted-by":"crossref","unstructured":"Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. Annual International Cryptology Conference (pp. 213\u2013229). Berlin, Heidelberg: Springer.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"1918_CR19","doi-asserted-by":"crossref","unstructured":"Khalili, A., Katz, J., & Arbaugh, W. A. (2003). Toward secure key distribution in truly ad-hoc networks. 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings (pp. 342\u2013346). IEEE.","DOI":"10.1109\/SAINTW.2003.1210183"},{"issue":"1","key":"1918_CR20","first-page":"112","volume":"31","author":"YWH Li","year":"2010","unstructured":"Li, Y. W. H., & Pang, L. (2010). A key management scheme for ad hoc networks without secure channels. Journal of Communications, 31(1), 112\u2013117.","journal-title":"Journal of Communications"},{"issue":"1","key":"1918_CR21","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TMC.2003.1195151","volume":"2","author":"S Capkun","year":"2003","unstructured":"Capkun, S., Buttyan, L., & Hubaux, J.-P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1), 52\u201364.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1918_CR22","doi-asserted-by":"crossref","unstructured":"Chang, C.-P., Lin, J.-C., & Lai, F. (2006). rust-group-based authentication services for mobile ad hoc networks. 2006 1st International Symposium on Wireless Pervasive Computing (p. 4\u2013pp). IEEE.","DOI":"10.1109\/ISWPC.2006.1613623"},{"key":"1918_CR23","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.future.2017.08.004","volume":"87","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., & Xiong, Z. (2018). Privacy-preserving wireless communications using bipartite matching in social big data. FGCS, 87, 772\u2013781.","journal-title":"FGCS"},{"key":"1918_CR24","unstructured":"Ling, C., Jiang, J., Wang, J., et\u00a0al. (2023). Deep graph representation learning and optimization for influence maximization. International Conference on Machine Learning (pp. 21350\u201321361). PMLR."},{"key":"1918_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Qiu, M., & Gao, H. (2023). Communication-efficient stochastic gradient descent ascent with momentum algorithms. IJCAI.","DOI":"10.24963\/ijcai.2023\/512"},{"issue":"1","key":"1918_CR26","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1002\/sec.131","volume":"3","author":"H Dahshan","year":"2010","unstructured":"Dahshan, H., & Irvine, J. (2010). A robust self-organized public key management for mobile ad hoc networks. Security and Communication Networks, 3(1), 16\u201330.","journal-title":"Security and Communication Networks"},{"key":"1918_CR27","first-page":"52","volume-title":"MobiQuitous","author":"S Yi","year":"2004","unstructured":"Yi, S., & Kravets, R. (2004). Composite key management for ad hoc networks. MobiQuitous (Vol. 4, pp. 52\u201361). Citeseer."},{"issue":"1","key":"1918_CR28","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCC.2016.2607708","volume":"7","author":"M Qiu","year":"2019","unstructured":"Qiu, M., Dai, W., & Vasilakos, A. (2019). Loop parallelism maximization for multimedia data processing in mobile vehicular clouds. IEEE Transactions on Cloud Computing, 7(1), 250\u2013258.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"12","key":"1918_CR29","doi-asserted-by":"publisher","first-page":"3528","DOI":"10.1109\/TC.2015.2409857","volume":"64","author":"M Qiu","year":"2015","unstructured":"Qiu, M., Ming, Z., et al. (2015). Phase-change memory optimization for green cloud with genetic algorithm. IEEE Transactions on Computers, 64(12), 3528\u20133540.","journal-title":"IEEE Transactions on Computers"},{"issue":"9","key":"1918_CR30","first-page":"6163","volume":"16","author":"Y Song","year":"2019","unstructured":"Song, Y., Li, Y., et al. (2019). Retraining strategy-based domain adaption network for intelligent fault diagnosis. IEEE TII, 16(9), 6163\u20136171.","journal-title":"IEEE TII"},{"key":"1918_CR31","first-page":"197","volume":"40","author":"J Yue","year":"2013","unstructured":"Yue, J., & Li, L. (2013). Anonymous identity authentication mechanism based on zero-knowledge proof. Computer Science, 40, 197\u2013199+214.","journal-title":"Computer Science"},{"key":"1918_CR32","unstructured":"Zhang, T-T. (2018). Research on routing security and privacy protection of opportunistic networks. [Master\u2019s thesis, Harbin Institute of Technology]."},{"key":"1918_CR33","unstructured":"Yang, L. (2012). Research on trust management in opportunity network. [Master\u2019s thesis, Xinjiang University]."},{"key":"1918_CR34","unstructured":"Liu, Z. (2020). Research on opportunity network community discovery and key management. [Master\u2019s thesis, Hefei University of Technology]."},{"key":"1918_CR35","first-page":"8887","volume":"975","author":"R Rajesh","year":"2016","unstructured":"Rajesh, R., Gavaskar, S., & Sumithra, A. (2016). A novel approach on certificateless encryption schemes. International Journal of Computer Applications, 975, 8887.","journal-title":"International Journal of Computer Applications"},{"key":"1918_CR36","doi-asserted-by":"crossref","unstructured":"Lin, C.-L., & Lin, W.-T. (2022). Multi-department limited secret sharing scheme based on polynomial interpolation (Vol. 12, p. 2124). Chinese Academic Journals, Hans Press, Hans Publishers.","DOI":"10.12677\/PM.2022.1212228"},{"key":"1918_CR37","doi-asserted-by":"crossref","unstructured":"Challarapu, N., & Chivukula, S. (2022). Elliptic curve cryptography applied for (k, n) threshold secret sharing scheme. ECS Transactions, 107(1), 1021.","DOI":"10.1149\/10701.1021ecst"},{"key":"1918_CR38","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., & K\u00e4rkk\u00e4inen, T. (2009). The ONE simulator for DTN protocol evaluation (pp. 1\u201310). Proceedings of the 2nd international conference on simulation tools and techniques.","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-024-01918-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-024-01918-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-024-01918-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T06:08:39Z","timestamp":1719036519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-024-01918-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":38,"journal-issue":{"issue":"6-7","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["1918"],"URL":"https:\/\/doi.org\/10.1007\/s11265-024-01918-7","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"4 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"For this type of study formal consent was not required. This manuscript does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"All authors disclosed no relevant relationships.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"The authors declare that they have no competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure"}}]}}