{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:43:10Z","timestamp":1725493390152},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/ictc.2015.7354563","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T16:56:00Z","timestamp":1450371360000},"page":"360-362","source":"Crossref","is-referenced-by-count":1,"title":["An encryption scheme based on trust for device-to-device communication on 5G"],"prefix":"10.1109","author":[{"given":"Gonzalo","family":"Huerta-Canepa","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"241","article-title":"Bootstrapping trust evaluations through stereotypes","author":"burnett","year":"2010","journal-title":"Proc of International Conference on Autonomous Agents and Multiagent Systems"},{"key":"ref11","article-title":"A user profile ontology for situation-aware social networking","author":"stan","year":"2008","journal-title":"3rd Workshop on Artificial Intelligence Techniques for Ambient Intelligence"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1192\/bjp.137.6.547"},{"key":"ref13","first-page":"343","article-title":"Learning with continuous classes","author":"quinlan","year":"1992","journal-title":"Proceedings of the 5th Australian Joint conference on Artificial Intelligence"},{"key":"ref14","first-page":"85","article-title":"Trust network analysis with subjective logic","author":"josang","year":"2006","journal-title":"Proceedings of the 29th Australasian Computer Science Conference-Volume 48"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/SP.2007.11","article-title":"Ciphertext-policy attribute-based encryption","author":"bethencourt","year":"2007","journal-title":"Security and Privacy 2007 SP'07 IEEE Symposium on"},{"journal-title":"The Psychology of Stereotyping","year":"2005","author":"schneider","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-2681(01)00214-1"},{"article-title":"The environment and social behavior: Privacy, personal space, territory, and crowding","year":"1975","author":"altman","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0272-4944(95)90011-X"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.60"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6940429"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4135\/9781452243610.n9"}],"event":{"name":"2015 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2015,10,28]]},"location":"Jeju Island, South Korea","end":{"date-parts":[[2015,10,30]]}},"container-title":["2015 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337634\/7354472\/07354563.pdf?arnumber=7354563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T21:56:05Z","timestamp":1498254965000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7354563\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ictc.2015.7354563","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}