2014
DOI: 10.1007/s11277-014-1996-4
|View full text |Cite
|
Sign up to set email alerts
|

Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 60 publications
(27 citation statements)
references
References 13 publications
0
27
0
Order By: Relevance
“…4) Hence, in this section, we designed a novel routing criterion named SPC_SD, which considers all of the key factors. 4) Hence, in this section, we designed a novel routing criterion named SPC_SD, which considers all of the key factors.…”
Section: Proposed Routing Criterionmentioning
confidence: 99%
See 1 more Smart Citation
“…4) Hence, in this section, we designed a novel routing criterion named SPC_SD, which considers all of the key factors. 4) Hence, in this section, we designed a novel routing criterion named SPC_SD, which considers all of the key factors.…”
Section: Proposed Routing Criterionmentioning
confidence: 99%
“…The manner in which p c i;j is obtained is shown in (4). The manner in which p c i;j is obtained is shown in (4).…”
Section: Proposed Routing Criterionmentioning
confidence: 99%
“…Another aim of the security research in the field of mobile networks is the end device security. Well known security companies have introduced their security applications for mobile platforms, also academic community has done research in this area [17][18][19]. However, we are not aware of any effective network security solution for mobile devices, which will mitigate well known core network related attacks [20].…”
Section: Related Workmentioning
confidence: 99%
“…New query q, instead of searching all the clients in the pre-cloaked set R set . These steps continue until there are no clients to be cloaked together anymore and velocity and changing distances will be calculated (steps [4][5][6][7][8][9][10][11][12][13][14][15][16][17]. The cloaked region requirement of k local and δp is treated as the qualified cloaked region (steps [19][20][21].The subsequent snapshot i in the query lifetime, we respectively check the satisfaction of the δq by adding each client in R i−1 , R i−2 , .…”
Section: Algorithm Depictionmentioning
confidence: 99%
“…For example, in deploying the other types of architecture like semi-distributed systems and TTP free, achieving privacy and authentication simultaneous has always been an issue. In other words, there is always a tradeoff between privacy and access control in which ever architecture used [6]. In the past, a fair amount of research efforts have been dedicated to protecting location privacy of mobile travelers.…”
Section: Introductionmentioning
confidence: 99%