{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T11:52:27Z","timestamp":1770724347707,"version":"3.49.0"},"reference-count":9,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T00:00:00Z","timestamp":1518134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous [...] <\/jats:p>","DOI":"10.3390\/fi10020018","type":"journal-article","created":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T12:46:27Z","timestamp":1518180387000},"page":"18","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Security and Privacy in Wireless and Mobile Networks"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6348-5031","authenticated-orcid":false,"given":"Georgios","family":"Kambourakis","sequence":"first","affiliation":[{"name":"Department of Information and Communication Systems Engineering, University of the Aegean, 83100 Karlovasi, Samos, Greece"}]},{"given":"Felix","family":"Gomez Marmol","sequence":"additional","affiliation":[{"name":"Department of Information and Communications Engineering, University of Murcia, 30100 Murcia, Spain"}]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Educational Software, Guangzhou University, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,2,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, W., and Kwok, L.F. (2018). Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. Futur. Internet, 10.","DOI":"10.3390\/fi10010006"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Almas Shehni, R., Faez, K., Eshghi, F., and Kelarestaghi, M. (2018). A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs. Futur. Internet, 10.","DOI":"10.3390\/fi10010001"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"He, J., Xiao, Q., He, P., and Pathan, M.S. (2017). An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning. Futur. Internet, 9.","DOI":"10.3390\/fi9010007"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Liu, P., Liu, Q., and Wang, G. (2018). An Anonymous Offline RFID Grouping-Proof Protocol. Futur. Internet, 10.","DOI":"10.3390\/fi10010002"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Loreti, P., Bracciale, L., and Caponi, A. (2018). Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications. Futur. Internet, 10.","DOI":"10.3390\/fi10020013"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Mamais, S.S., and Theodorakopoulos, G. (2017). Private and Secure Distribution of Targeted Advertisements to Mobile Phones. Futur. Internet, 9.","DOI":"10.3390\/fi9020016"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Mamais, S.S., and Theodorakopoulos, G. (2017). Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems. Futur. Internet, 9.","DOI":"10.3390\/fi9040088"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wangen, G., and Katsikas, S.K. (2017). User Modelling Validation over the Security Awareness of Digital Natives. Futur. Internet, 9.","DOI":"10.3390\/fi9030032"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Guazzini, A., Sarac, A., Donati, C., Nardi, A., Vilone, D., and Meringolo, P. (2017). Participation and Privacy Perception in Virtual Environments: The Role of Sense of Community, Culture and Gender between Italian and Turkish. Futur. Internet, 9.","DOI":"10.3390\/fi9020011"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/2\/18\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:54:28Z","timestamp":1760194468000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/2\/18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,9]]},"references-count":9,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,2]]}},"alternative-id":["fi10020018"],"URL":"https:\/\/doi.org\/10.3390\/fi10020018","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,9]]}}}