{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:17:02Z","timestamp":1761401822563,"version":"3.37.3"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/access.2016.2617207","type":"journal-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T18:19:45Z","timestamp":1476987585000},"page":"7692-7702","source":"Crossref","is-referenced-by-count":18,"title":["Dynamic Trust Associations Over Socially-Aware D2D Technology: A Practical Implementation Perspective"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3412-1639","authenticated-orcid":false,"given":"Aleksandr","family":"Ometov","sequence":"first","affiliation":[]},{"given":"Ekaterina","family":"Olshannikova","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Masek","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Olsson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8382-9185","authenticated-orcid":false,"given":"Jiri","family":"Hosek","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Andreev","sequence":"additional","affiliation":[]},{"given":"Yevgeni","family":"Koucheryavy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/11429760_6"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/S1071-5819(03)00041-7"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.17487\/rfc3766"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/s00145-001-0009-4"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/WCNC.2014.6953070"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.comnet.2016.03.013"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1093\/sf\/63.4.967"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1080\/03637757409375842"},{"key":"ref35","first-page":"275","article-title":"Cooperation and trust: Some theoretical notes","author":"deutsch","year":"1962","journal-title":"Nebraska Symp Motivation"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.2307\/2216409"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ACCESS.2014.2379938"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1037\/0003-066X.39.10.1123"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/MWC.2010.5675775"},{"year":"2004","author":"thurlow","journal-title":"Computer mediated communication","key":"ref12"},{"year":"2006","author":"benantar","journal-title":"Access Control Systems Security Identity Management and Trust Models","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.comnet.2016.03.007"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/Trustcom.2015.453"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/PIMRC.2015.7343540"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MCOM.2012.6163598"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICCW.2016.7503877"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.3390\/s16060836"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/3-540-39568-7_5"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-319-04963-2_6"},{"year":"2003","author":"adams","journal-title":"Understanding PKI Concepts Standards and Deployment Considerations","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MWC.2011.5876498"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/939018.939021"},{"year":"2015","journal-title":"Implementing Secure LTE-Assisted D2D Framework for Unreliable Cellular Connectivity","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/s11277-007-9425-6"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SURV.2013.082713.00034"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICCW.2009.5208020"},{"year":"2016","journal-title":"Ericsson Mobility Report - on the Pulse of the Networked Society","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2020408.2020579"},{"year":"2016","journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/LCOMM.2011.122810.102007"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/s00502-014-0209-x"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICUMT.2015.7382443"},{"year":"2012","author":"scott","journal-title":"Social Network Analysis","key":"ref42"},{"year":"2014","journal-title":"Universal Mobile Telecommunications System (UMTS) LTE Proximity-Based Services (ProSe) Security Aspects (Version 12 1 0 Release 12)","key":"ref24"},{"year":"2013","author":"rojas","journal-title":"Neural Networks A Systematic Introduction","key":"ref41"},{"year":"2013","article-title":"The case for device-to-device proximate discovery","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/S0191-3085(00)22009-1"},{"year":"2014","journal-title":"Proximity-Based Services (ProSe) Stage 2","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1146\/annurev-psych-113011-143828"},{"key":"ref25","first-page":"186","article-title":"Dynamic social trust associations over D2D communications: An implementation perspective","author":"urama","year":"2016","journal-title":"Proc IEEE Int Conf Mobile Services"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7419931\/07604102.pdf?arnumber=7604102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:40Z","timestamp":1642004800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7604102\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2016.2617207","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2016]]}}}