4
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Kademlia: A Peer-to-Peer Information System Based on the XOR Metric

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Social Serendipity: Mobilizing Social Software

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Face processing: Human perception and principal components analysis

                Bookmark

                Author and article information

                Journal
                IEEE Transactions on Dependable and Secure Computing
                IEEE Trans. Dependable and Secure Comput.
                Institute of Electrical and Electronics Engineers (IEEE)
                1545-5971
                November 2013
                November 2013
                : 10
                : 6
                : 380-393
                Article
                10.1109/TDSC.2013.19
                dd25f5b8-53c3-4af4-b38c-bb19e53e3b2f
                © 2013
                History

                Comments

                Comment on this article