参考文献/References:
[1] S Stevens Negus, Jack Henningfield. Agonist Medications for the Treatment of Cocaine Use Disorder[J]. Neuropsychopharmacology, 2015,40(8):1815-1825.
[2] Batabyal Suvadip, Bhaumik Parama. Analysing social behaviour and message dissemination in human based delay tolerant network[J]. Wireless Networks, 2015,21(2):513-529.
[3] Ana Cristina Kochem Vendramin, Anelise Munaretto, Myriam Regattieri Delgado, et al. A social-aware routing protocol for opportunistic networks [J].2016,54(15):354-359.
[4] Caverlee J, Liu L, Webb S. The Social Trust framework for Trusted Social Information Management: Architecture and Algorithms [J]. Information Sciences, 2010, 180(1):95-112.
[5] Li Y, Gao Y, Li S, et al. Integrating forwarding and replication in DTN routing: a social network perspective. Proceedings of the 73rd Vehicular Technology Conference (VTC-Spring’11), 2011,5:15-18.
[6] Marti S, Giuli TJ, Lai K, et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[C]. International Conference on Mobile Computing and Networking, Boston, MA, USA, 2000: 31—38.
[7]张蓓.带关键词检索公钥加密技术的研究与实现[D].广州:暨南大学.2010.
Zhang Bei. The Research and implement of public key encryption with keyword search schemes [J]. Guangzhou: Jinan university,2010.
[8] Yang L, Zhange Z, Pu L Rough Set and Trust Assessment-based Potential Paths Analysis and Mining for Multimedia Social Networks [J]. International Journal of Digital Content Technology Its Applications, 2012, 6(22):640-647.
[9] Na L, Das SK. A Trust-based Framework for Data Forwarding in Opportunistic Networks[J]. Ad Hoc Networks, 2013, 11:1497-1509.
[10]胡予濮,张玉清,肖国镇.对称密码学[M].机械工业出版社,2002.
Hu Yupu, Zhang Yuqing, Xiao Guozhen. Symmetric cryptography[M]. China Machine PRESS,2002.
[11]刘阳.基于属性的加密体制研究[D].广州:中山大学.2009.
[12]姚显青. 基于真实地图数据的车辆机会网络仿真平台设计与实现[D].成都:电子科技大学, 2015.
Yao Xianqing. Design and implementation of vehicle opportunity network simulation platform based on real map data[D]. Cheng Du: University of Electronic Science and Technology, 2015.