{"id":"https://openalex.org/W133668674","doi":"https://doi.org/10.1007/978-3-319-15087-1_17","title":"A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks","display_name":"A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W133668674","doi":"https://doi.org/10.1007/978-3-319-15087-1_17","mag":"133668674"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-15087-1_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-15087-1_17","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045719969","display_name":"Fizza Abbas","orcid":"https://orcid.org/0000-0002-4398-3460"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Fizza Abbas","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017839273","display_name":"Ubaidullah Rajput","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ubaidullah Rajput","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090705977","display_name":"Rasheed Hussain","orcid":"https://orcid.org/0000-0002-3771-7537"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Rasheed Hussain","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077013640","display_name":"Hasoo Eun","orcid":null},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hasoo Eun","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102887306","display_name":"Heekuck Oh","orcid":"https://orcid.org/0000-0002-2989-8737"},"institutions":[{"id":"https://openalex.org/I4575257","display_name":"Hanyang University","ror":"https://ror.org/046865y68","country_code":"KR","type":"education","lineage":["https://openalex.org/I4575257"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Heekuck Oh","raw_affiliation_strings":["Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Hanyang University, Seoul, South Korea","institution_ids":["https://openalex.org/I4575257"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5045719969"],"corresponding_institution_ids":["https://openalex.org/I4575257"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.6105,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.91597856,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"216","last_page":"227"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8575599193572998},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.653856635093689},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6501777172088623},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6050426959991455},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5226104855537415},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5103911757469177},{"id":"https://openalex.org/keywords/mobile-social-network","display_name":"Mobile social network","score":0.49107956886291504},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4746582806110382},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.45535826683044434},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.42410823702812195},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4064284563064575},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.3991546034812927},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3668617308139801},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16933274269104004},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1275058388710022},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1016325056552887}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8575599193572998},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.653856635093689},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6501777172088623},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6050426959991455},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5226104855537415},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5103911757469177},{"id":"https://openalex.org/C2780228002","wikidata":"https://www.wikidata.org/wiki/Q2059727","display_name":"Mobile social network","level":3,"score":0.49107956886291504},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4746582806110382},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.45535826683044434},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.42410823702812195},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4064284563064575},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.3991546034812927},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3668617308139801},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16933274269104004},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1275058388710022},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1016325056552887},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-15087-1_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-15087-1_17","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/112ee169-f445-4e5d-ba8b-03344b9fdc2e","is_oa":false,"landing_page_url":"https://hdl.handle.net/1983/112ee169-f445-4e5d-ba8b-03344b9fdc2e","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Abbas, F, Rajput, U, Hussain, R, Eun, H & Oh, H 2015, A trustless broker based protocol to discover friends in proximity-based mobile social networks. in K-H Rhee & J H Yi (eds), Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8909, Springer Verlag, pp. 216-227. https://doi.org/10.1007/978-3-319-15087-1_17","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/112ee169-f445-4e5d-ba8b-03344b9fdc2e","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/112ee169-f445-4e5d-ba8b-03344b9fdc2e","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Abbas, F, Rajput, U, Hussain, R, Eun, H & Oh, H 2015, A trustless broker based protocol to discover friends in proximity-based mobile social networks. in K-H Rhee & J H Yi (eds), Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8909, Springer Verlag, pp. 216-227. https://doi.org/10.1007/978-3-319-15087-1_17","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1528884161","https://openalex.org/W2039368130","https://openalex.org/W2056401003","https://openalex.org/W2075551143","https://openalex.org/W2076195444","https://openalex.org/W2084496466","https://openalex.org/W2102583223","https://openalex.org/W2107233554","https://openalex.org/W2114434656","https://openalex.org/W2132288739","https://openalex.org/W2137915909","https://openalex.org/W2139979322","https://openalex.org/W2142514943","https://openalex.org/W2143087446","https://openalex.org/W2169090952","https://openalex.org/W2619633776"],"related_works":["https://openalex.org/W2048100608","https://openalex.org/W2090296580","https://openalex.org/W1576249345","https://openalex.org/W4243905374","https://openalex.org/W2068804032","https://openalex.org/W2785815065","https://openalex.org/W1796074903","https://openalex.org/W4245955065","https://openalex.org/W4254967497","https://openalex.org/W2275408081"],"abstract_inverted_index":null,"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
