{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:10Z","timestamp":1750306390369,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":14,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201406280092"],"award-info":[{"award-number":["201406280092"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2801694.2801705","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T20:08:52Z","timestamp":1440706132000},"page":"4-6","source":"Crossref","is-referenced-by-count":3,"title":["Trustworthy Device Pairing for Opportunistic Device-to-Device Communications in Mobile Crowdsourcing Systems"],"prefix":"10.1145","author":[{"given":"Cong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Fengrui","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Julie","family":"McCann","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2801694.2801705-1","doi-asserted-by":"crossref","unstructured":"Ju Ren, Yaoxue Zhang, Kuan Zhang, and Xuemin Shen. Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions. IEEE Commun. Mag., 53(3):98--105, 2015.","DOI":"10.1109\/MCOM.2015.7060488"},{"key":"key-10.1145\/2801694.2801705-2","doi-asserted-by":"crossref","unstructured":"A. Asadi, Qing Wang, and V. Mancuso. A survey on device-to-device communication in cellular networks. IEEE COMMUN SURV TUT, 16(4):1801--1819, 2014.","DOI":"10.1109\/COMST.2014.2319555"},{"key":"key-10.1145\/2801694.2801705-3","doi-asserted-by":"crossref","unstructured":"Shusen Yang, Usman Adeel, and Julie McCann. Selfish mules: Social profit maximization in sparse sensornets using rationally-selfish human relays. IEEE J. Sel. Areas Commun., 31(6):1124--1134, 2013.","DOI":"10.1109\/JSAC.2013.130614"},{"key":"key-10.1145\/2801694.2801705-4","doi-asserted-by":"crossref","unstructured":"Shusen Yang, Usman Adeel, and Julie McCann. Backpressure meets taxes: Faithful data collection in stochastic mobile phone sensing systems. In Proc. IEEE INFOCOM, 2015.","DOI":"10.1109\/INFOCOM.2015.7218527"},{"key":"key-10.1145\/2801694.2801705-5","unstructured":"Wi-fi peer-to-peer (p2p) technical specification v1.5. Wi-Fi Alliance, 2014."},{"key":"key-10.1145\/2801694.2801705-6","unstructured":"Bluetooth core specification 4.2. Bluetooth SIG, 2014."},{"key":"key-10.1145\/2801694.2801705-7","doi-asserted-by":"crossref","unstructured":"Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and Majid Sobhani. Context-based zero-interaction pairing and key evolution for advanced personal devices. In Proc. ACM CCS, pages 880--891. ACM, 2014.","DOI":"10.1145\/2660267.2660334"},{"key":"key-10.1145\/2801694.2801705-8","doi-asserted-by":"crossref","unstructured":"Hien Thi Thu Truong, Xiang Gao, Babins Shrestha, Nitesh Saxena, N Asokan, and Petteri Nurmi. Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication. In Proc. IEEE PerCom, pages 163--171. IEEE, 2014.","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"key-10.1145\/2801694.2801705-9","doi-asserted-by":"crossref","unstructured":"Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan Zhang. Synergy: A game-theoretical approach for cooperative key generation in wireless networks. In Proc. IEEE INFOCOM, pages 997--1005. IEEE, 2014.","DOI":"10.1109\/INFOCOM.2014.6848029"},{"key":"key-10.1145\/2801694.2801705-10","doi-asserted-by":"crossref","unstructured":"Sattam S Al-Riyami and Kenneth G Paterson. Certificateless public key cryptography. In Advances in Cryptology-ASIACRYPT 2003, pages 452--473. Springer, 2003.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"key-10.1145\/2801694.2801705-11","doi-asserted-by":"crossref","unstructured":"Antoine Joux and Kim Nguyen. Separating decision diffie--hellman from computational diffie--hellman in cryptographic groups. Springer J CRYPTOL, 16(4):239--247, 2003.","DOI":"10.1007\/s00145-003-0052-4"},{"key":"key-10.1145\/2801694.2801705-12","unstructured":"Android. Bluetooth adapter. http:\/\/developer.android.com\/reference\/android\/bluetooth\/BluetoothAdapter.html."},{"key":"key-10.1145\/2801694.2801705-13","unstructured":"Bouncy Castle. The legion of the bouncy castle java cryptography apis. http:\/\/www.bouncycastle.org\/java.html."},{"key":"key-10.1145\/2801694.2801705-14","unstructured":"Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography Version 1.0, 2000."}],"event":{"number":"2015","sponsor":["SIGMOBILE, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"acronym":"S3 '15","name":"the 2015 Workshop","start":{"date-parts":[[2015,9,11]]},"location":"Paris, France","end":{"date-parts":[[2015,9,11]]}},"container-title":["Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, &amp; for the Students - S3 '15"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801694.2801705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2801705&amp;ftid=1616584&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:13Z","timestamp":1750223233000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2801694.2801705"}},"subtitle":[],"proceedings-subject":"Wireless of the Students, by the Students, & for the Students","short-title":[],"issued":{"date-parts":[[2015]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1145\/2801694.2801705","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}