{"id":"https://openalex.org/W2205393692","doi":"https://doi.org/10.1109/milcom.2015.7357567","title":"Achieving secure friend discovery in social strength-aware PMSNs","display_name":"Achieving secure friend discovery in social strength-aware PMSNs","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2205393692","doi":"https://doi.org/10.1109/milcom.2015.7357567","mag":"2205393692"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2015.7357567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357567","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024053576","display_name":"Ben Niu","orcid":"https://orcid.org/0000-0001-5822-8743"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ben Niu","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739224","display_name":"Yuanyuan He","orcid":"https://orcid.org/0000-0001-6706-4859"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan He","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325259","display_name":"Fenghua Li","orcid":"https://orcid.org/0000-0003-0638-5610"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fenghua Li","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["National Key Laboratory of Integrated Networks Services, Xidian University, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Integrated Networks Services, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024053576"],"corresponding_institution_ids":["https://openalex.org/I19820366"],"apc_list":null,"apc_paid":null,"fwci":3.02,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.92707994,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"947","last_page":"953"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jaccard-index","display_name":"Jaccard index","score":0.7742636799812317},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7669304609298706},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.6820310354232788},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5417173504829407},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.45886608958244324},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.4549413025379181},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4411100745201111},{"id":"https://openalex.org/keywords/similarity-measure","display_name":"Similarity measure","score":0.4169039726257324},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.33894991874694824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3209262490272522},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.28778699040412903},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.2130623161792755},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.11336055397987366}],"concepts":[{"id":"https://openalex.org/C203519979","wikidata":"https://www.wikidata.org/wiki/Q865360","display_name":"Jaccard index","level":3,"score":0.7742636799812317},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7669304609298706},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.6820310354232788},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5417173504829407},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.45886608958244324},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.4549413025379181},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4411100745201111},{"id":"https://openalex.org/C2776517306","wikidata":"https://www.wikidata.org/wiki/Q29017317","display_name":"Similarity measure","level":2,"score":0.4169039726257324},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.33894991874694824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3209262490272522},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.28778699040412903},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.2130623161792755},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.11336055397987366},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2015.7357567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357567","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1510216169","https://openalex.org/W1631405927","https://openalex.org/W1975642132","https://openalex.org/W2007890401","https://openalex.org/W2013315566","https://openalex.org/W2049939281","https://openalex.org/W2076195444","https://openalex.org/W2091730026","https://openalex.org/W2100975556","https://openalex.org/W2107233554","https://openalex.org/W2115973896","https://openalex.org/W2132172731","https://openalex.org/W2132288739","https://openalex.org/W2134974263","https://openalex.org/W2139223971","https://openalex.org/W2139979322","https://openalex.org/W2142514943","https://openalex.org/W2143087446","https://openalex.org/W2143824669","https://openalex.org/W2144644951","https://openalex.org/W2145341289","https://openalex.org/W2147866554","https://openalex.org/W2152832755","https://openalex.org/W2169090952","https://openalex.org/W2294459625","https://openalex.org/W2935372773","https://openalex.org/W2952180695","https://openalex.org/W6637022906","https://openalex.org/W6680867728","https://openalex.org/W6680949620","https://openalex.org/W6696974764","https://openalex.org/W6761015403","https://openalex.org/W7039109124"],"related_works":["https://openalex.org/W4254879869","https://openalex.org/W3022576529","https://openalex.org/W2628526247","https://openalex.org/W2596401011","https://openalex.org/W2084099224","https://openalex.org/W2612383974","https://openalex.org/W3123940961","https://openalex.org/W2151474089","https://openalex.org/W2171272270","https://openalex.org/W2367848132"],"abstract_inverted_index":{"With":[0],"Proximity-based":[1],"Mobile":[2],"Social":[3],"Networks":[4],"(PMSNs),":[5],"mobile":[6],"users":[7,27],"can":[8],"discover":[9],"and":[10,87,126,140,145],"make":[11],"new":[12],"social":[13,44,71,88],"interactions":[14],"easily":[15],"with":[16,81],"physical-proximate":[17],"others":[18],"through":[19],"WiFi/Bluetooth":[20],"interfaces":[21],"embedded":[22],"in":[23,70],"the":[24,32,48,120,123,127,132,135],"smartphones.":[25],"Unfortunately,":[26],"enjoy":[28],"these":[29,58],"conveniences":[30],"at":[31],"cost":[33],"of":[34,122],"revealing":[35],"their":[36],"personal":[37],"data.":[38],"Furthermore,":[39],"an":[40],"important":[41],"factor":[42],"called":[43],"strength,":[45],"which":[46,63],"impacts":[47],"discovering":[49],"result":[50],"a":[51,77,94,109],"lot,":[52],"is":[53],"always":[54],"ignored.":[55],"To":[56],"address":[57],"problems,":[59],"we":[60],"propose":[61],"S-match,":[62],"aims":[64],"to":[65,102],"achieve":[66],"secure":[67],"friend":[68],"discovery":[69],"strength-aware":[72,89],"PMSNs.":[73],"Specifically,":[74],"S-match":[75],"exploits":[76],"two-dimensional":[78],"similarity":[79,85,90,95,112,117,129],"vector":[80],"considering":[82],"both":[83],"priority-aware":[84,111,128],"coefficient":[86,113,130],"coefficient.":[91],"We":[92],"construct":[93],"evaluation":[96],"model":[97],"based":[98],"on":[99,134],"entropy":[100],"method":[101],"measure":[103],"profile":[104],"similarity,":[105],"as":[106,108],"well":[107],"novel":[110],"by":[114],"improving":[115],"Jaccard":[116],"function.":[118],"Finally,":[119],"combination":[121],"homomorphic":[124],"property":[125],"guarantee":[131],"avoidance":[133],"insider":[136],"attacks.":[137],"The":[138],"security":[139],"performance":[141],"are":[142],"thoroughly":[143],"analyzed":[144],"evaluated":[146],"via":[147],"detailed":[148],"simulations.":[149]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
