{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:08:33Z","timestamp":1761808113675},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:00:00Z","timestamp":1490313600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11280-017-0432-6","type":"journal-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T13:37:31Z","timestamp":1490362651000},"page":"241-260","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A game-theoretic approach to advertisement dissemination in ephemeral networks"],"prefix":"10.1007","volume":"21","author":[{"given":"Lihua","family":"Yin","sequence":"first","affiliation":[]},{"given":"Yunchuan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanwei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Junyan","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"issue":"1","key":"432_CR1","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/TVT.2015.2454291","volume":"65","author":"Y Cai","year":"2016","unstructured":"Cai, Y., Fan, Y., Wen, D.: An incentive-compatible routing protocol for two-hop delay-tolerant networks. IEEE Trans. Veh. Technol. 65(1), 266\u2013277 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"432_CR2","doi-asserted-by":"crossref","first-page":"6377","DOI":"10.1109\/TVT.2015.2477164","volume":"65","author":"H Chen","year":"2016","unstructured":"Chen, H., Lou, W., Wang, Z., Wang, Q.: A secure credit-based incentive mechanism for message forwarding in noncooperative dtns. IEEE Trans. Veh. Technol. 65(8), 6377\u20136388 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"432_CR3","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TVT.2010.2093587","volume":"60","author":"T Chen","year":"2011","unstructured":"Chen, T., Zhu, L., Wu, F., Zhong, S.: Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretic approach. IEEE Trans. Veh. Technol. 60 (2), 566\u2013579 (2011)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"432_CR4","doi-asserted-by":"crossref","unstructured":"Chuang, I., Lin, T., Lo, C., Kuo, Y.: Time-sensitive data dissemination in opportunistic networks. In: IEEE Conference on Wireless Communications and Networking Conference, pp. 2420\u20132425 (2014)","DOI":"10.1109\/WCNC.2014.6952728"},{"issue":"1","key":"432_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11238-012-9334-3","volume":"75","author":"JL Ford","year":"2013","unstructured":"Ford, J.L., David, K., Wei, P.: Information and ambiguity: Herd and contrarian behaviour in financial markets. Theor. Decis. 75(1), 1\u201315 (2013)","journal-title":"Theor. Decis."},{"key":"432_CR6","volume-title":"IEEE Conference on Computer Communications, Pp. 1006\u20131014. 1","author":"Y Guo","year":"2014","unstructured":"Guo, Y., Yin, L., Liu, L., Fang, B.: Utility-Based Cooperative Decision in Cooperative Authentication IEEE Conference on Computer Communications, Pp. 1006\u20131014. 1 (2014)"},{"issue":"5","key":"432_CR7","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1177\/1461444811405805","volume":"13","author":"E Hargittai","year":"2011","unstructured":"Hargittai, E., Litt, E.: The tweet smell of celebrity success: Explaining variation in twitter adoption among a diverse group of young adults. New Media Soc. 13(5), 824\u2013842 (2011)","journal-title":"New Media Soc."},{"key":"432_CR8","unstructured":"Hassan, K.H.: E-Commerce and Consumer Protection in Malaysia: Advertisement and False Description ACM Conference on Economics and Finance Research IPEDR, vol. 32 (2012)"},{"key":"432_CR9","first-page":"727","volume-title":"IEEE Symposium on Computers and Communication","author":"H Huang","year":"2015","unstructured":"Huang, H., Rui, L., Zheng, W., Niu, D., Xiong, Y., Zhang, P., Qiu, X.: Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: a Repeated Cooperative Game-Theoretic Approach IEEE Symposium on Computers and Communication, pp 727\u2013731 (2015)"},{"issue":"2","key":"432_CR10","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11277-015-3084-9","volume":"88","author":"R Hussain","year":"2016","unstructured":"Hussain, R., Kim, S., Oh, H.: Traffic information dissemination system: Extending cooperative awareness among smart vehicles with only single-hop beacons in vanet. Wirel. Pers. Commun. 88(2), 151\u2013172 (2016)","journal-title":"Wirel. Pers. Commun."},{"key":"432_CR11","first-page":"1","volume-title":"Vehicular Technology Conference","author":"J Kim","year":"2015","unstructured":"Kim, J., Lee, H.: Vada: Wi-fi Direct Based Voluntary Advertisement Dissemination Algorithm for Social Commerce Service Vehicular Technology Conference, pp 1\u20136 (2015)"},{"issue":"6","key":"432_CR12","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1109\/TMC.2015.2465375","volume":"15","author":"Q Li","year":"2016","unstructured":"Li, Q., Cao, G.: Providing privacy-aware incentives in mobile sensing systems. IEEE Trans. Mob. Comput. 15(6), 1485\u20131498 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"432_CR13","first-page":"243","volume-title":"Conference on Mobile Computing and Networking","author":"M Motani","year":"2005","unstructured":"Motani, M., Srinivasan, V., Nuggehalli, P.S.: Peoplenet: Engineering a Wireless Virtual Social Network Conference on Mobile Computing and Networking, pp 243\u2013257 (2005)"},{"key":"432_CR14","first-page":"59","volume-title":"ACM Conference on Mobile Systems, Applications, and Services","author":"S Nath","year":"2015","unstructured":"Nath, S.: Madscope: Characterizing Mobile In-App Targeted Ads ACM Conference on Mobile Systems, Applications, and Services, pp 59\u201373 (2015)"},{"key":"432_CR15","first-page":"2310","volume-title":"IEEE Conference on Computer Communications","author":"T Ning","year":"2013","unstructured":"Ning, T., Yang, Z., Wu, H., Han, Z.: Self-Interest-Driven Incentives for Ad Dissemination in Autonomous Mobile Social Networks IEEE Conference on Computer Communications, pp 2310\u20132318 (2013)"},{"issue":"3","key":"432_CR16","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1108\/17505930910985116","volume":"3","author":"A Palmer","year":"2009","unstructured":"Palmer, A., Koenig-Lewis, N.: An experiential, social network-based approach to direct marketing. Direct Mark. Int. J. 3(3), 162\u2013176 (2009)","journal-title":"Direct Mark. Int. J."},{"key":"432_CR17","first-page":"291","volume-title":"ACM Conference on Computer and Communications Security","author":"S Reidt","year":"2009","unstructured":"Reidt, S., Srivatsa, M., Balfe, S.: The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks ACM Conference on Computer and Communications Security, pp 291\u2013302 (2009)"},{"key":"432_CR18","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jnca.2016.01.002","volume":"67","author":"C Sobin","year":"2016","unstructured":"Sobin, C., Raychoudhury, V., Marfia, G., Singla, A.: A survey of routing and data dissemination in delay tolerant networks. J. Netw. Comput. Appl. 67, 128\u2013146 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"432_CR19","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1257\/aer.99.2.424","volume":"99","author":"V Stango","year":"2009","unstructured":"Stango, V., Zinman, J.: What do consumers really pay on their checking and credit card accounts? explicit, implicit, and avoidable costs. Am. Econ. Rev. 99(2), 424\u201329 (2009)","journal-title":"Am. Econ. Rev."},{"key":"432_CR20","first-page":"115","volume-title":"International Conference on Management of Data","author":"A Surana","year":"2010","unstructured":"Surana, A., Kiran, R.U., Reddy, P.K.: Selecting a Right Interestingness Measure for Rare Association Rules International Conference on Management of Data, pp 115\u2013124 (2010)"},{"issue":"7","key":"432_CR21","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/TPDS.2013.275","volume":"25","author":"B Tang","year":"2014","unstructured":"Tang, B., Ye, B., Guo, S., Lu, S., Wu, D.O.: Order-optimal information dissemination in manets via network coding. IEEE Trans. Parallel Distrib. Syst. 25(7), 1841\u20131851 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"11","key":"432_CR22","doi-asserted-by":"crossref","first-page":"2909","DOI":"10.1109\/TPDS.2013.158","volume":"25","author":"J Teng","year":"2014","unstructured":"Teng, J., Zhang, B., Bai, X., Yang, Z., Xuan, D.: Incentive-driven and privacy-preserving message dissemination in large-scale mobile networks. IEEE Trans. Parallel Distrib. Syst. 25(11), 2909\u20132919 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"432_CR23","first-page":"1188","volume-title":"Proc. of IEEE International Conference on Communications","author":"W Wang","year":"2015","unstructured":"Wang, W., Yang, L., Liao, Q., Zhu, X., Zhang, Q.: Tisa: Time-Dependent Social Network Advertising Proc. of IEEE International Conference on Communications, pp 1188\u20131193 (2015)"},{"issue":"1-2","key":"432_CR24","first-page":"95","volume":"19","author":"L Wei","year":"2013","unstructured":"Wei, L., Zhu, H., Cao, Z., Shen, X.: Success: a secure user-centric and social-aware reputation based incentive scheme for dtns. Ad Hoc Sens. Wirel. Netw 19 (1-2), 95\u2013118 (2013)","journal-title":"Ad Hoc Sens. Wirel. Netw"},{"key":"432_CR25","first-page":"207","volume-title":"IEEE Symposium on Quality of Service","author":"H Xie","year":"2015","unstructured":"Xie, H., Lui, J.C., Towsley, D.: Incentive and Reputation Mechanisms for Online Crowdsourcing Systems IEEE Symposium on Quality of Service, pp 207\u2013212 (2015)"},{"issue":"3","key":"432_CR26","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1109\/TETC.2015.2414792","volume":"3","author":"Q Xu","year":"2015","unstructured":"Xu, Q., Su, Z., Zhang, K., Ren, P., Shen, X.S.: Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Topics Comput. 3(3), 399\u2013409 (2015)","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"432_CR27","first-page":"610","volume-title":"Springer Asia-Pacific Web Conference","author":"L Yin","year":"2015","unstructured":"Yin, L., Guo, Y., Sun, Y., Qian, J., Vasilakos, A.: Ad Dissemination Game in Ephemeral Networks Springer Asia-Pacific Web Conference, pp 610\u2013622 (2015)"},{"issue":"8","key":"432_CR28","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TPDS.2013.221","volume":"25","author":"D Zeng","year":"2014","unstructured":"Zeng, D., Guo, S., Hu, J.: Reliable bulk-data dissemination in delay tolerant networks. IEEE Trans. Parallel Distrib. Syst. 25(8), 2180\u20132189 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"432_CR29","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/COMST.2015.2415528","volume":"18","author":"X Zhang","year":"2016","unstructured":"Zhang, X., Yang, Z., Sun, W., Liu, Y., Tang, S., Xing, K., Mao, X.: Incentives for mobile crowd sensing: a survey. IEEE Commun. Surv. Tutorials 18(1), 54\u201367 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"432_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, Y., van der Schaar, M.: Reputation-Based Incentive Protocols in Crowdsourcing Applications IEEE Conference on Computer Communications, pp 2140\u20132148 (2012)","DOI":"10.1109\/INFCOM.2012.6195597"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-017-0432-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-017-0432-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-017-0432-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T01:10:59Z","timestamp":1568941859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-017-0432-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["432"],"URL":"https:\/\/doi.org\/10.1007\/s11280-017-0432-6","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,24]]}}}