{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:08:02Z","timestamp":1767337682004},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_1","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:02:46Z","timestamp":1562785366000},"page":"1-14","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Distributed Privacy Preserving Platform for Ridesharing Services"],"prefix":"10.1007","author":[{"given":"Yevhenii","family":"Semenko","sequence":"first","affiliation":[]},{"given":"Damien","family":"Saucez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"unstructured":"Arcade City: The Future of Ridesharing Is Decentralized. \n                    https:\/\/fee.org\/articles\/arcade-city-the-future-of-ridesharing-is-decentralized\/","key":"1_CR1"},{"unstructured":"Hailing Rides Down Crypto Lane: The Future Of Ridesharing. \n                    https:\/\/www.forbes.com\/sites\/andrewrossow\/2018\/07\/18\/hailing-rides-down-crypto-lane-the-future-of-ridesharing\/\n                    \n                  . Accessed 11 December 2018","key":"1_CR2"},{"unstructured":"LaZooz. \n                    http:\/\/lazooz.org\n                    \n                  . Accessed 11 December 2018","key":"1_CR3"},{"unstructured":"Spring Framework. \n                    https:\/\/spring.io\n                    \n                  . Accessed 14 February 2019","key":"1_CR4"},{"unstructured":"TNCs TODAY. \n                    http:\/\/tncstoday.sfcta.orgtncstoday.sfcta.org\n                    \n                  . Accessed 17 August 2018","key":"1_CR5"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.trc.2016.09.017","volume":"72","author":"UM A\u00efvodji","year":"2016","unstructured":"A\u00efvodji, U.M., Gambs, S., Huguet, M.J., Killijian, M.O.: Meeting points in ridesharing: A privacy-preserving approach. Transp. Res. Part C Emerg. Technol. 72, 239\u2013253 (2016)","journal-title":"Transp. Res. Part C Emerg. Technol."},{"unstructured":"Cadwalladr, C., Graham-Harrison, E.: Revealed: 50 million facebook profiles harvested for Cambridge analytica in major data breach. The Guardian 17 (2018)","key":"1_CR7"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-319-42345-6_17","volume-title":"Computational Social Networks","author":"C Dai","year":"2016","unstructured":"Dai, C., Yuan, X., Wang, C.: Privacy-preserving ridesharing recommendation in geosocial networks. In: Nguyen, H.T.T., Snasel, V. (eds.) CSoNet 2016. LNCS, vol. 9795, pp. 193\u2013205. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-42345-6_17"},{"unstructured":"Fletcher, D.: How facebook is redefining privacy (2010)","key":"1_CR9"},{"issue":"1","key":"1_CR10","first-page":"4","volume":"2","author":"P Goel","year":"2016","unstructured":"Goel, P., Kulik, L., Ramamohanarao, K.: Privacy-aware dynamic ride sharing. ACM Trans. Spat. Algorithms Syst. (TSAS) 2(1), 4 (2016)","journal-title":"ACM Trans. Spat. Algorithms Syst. (TSAS)"},{"issue":"2","key":"1_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","volume":"7","author":"EK Lua","year":"2005","unstructured":"Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun. Surv. Tutor. 7(2), 72\u201393 (2005)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"P Maymounkov","year":"2002","unstructured":"Maymounkov, P., Mazi\u00e8res, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53\u201365. Springer, Heidelberg (2002). \n                    https:\/\/doi.org\/10.1007\/3-540-45748-8_5"},{"unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)","key":"1_CR13"},{"unstructured":"Pham, T.V.A., Dacosta Petrocelli, I.I., Endignoux, G.F.M., Troncoso-Pastoriza, J.R., Huguenin, K., Hubaux, J.P.: Oride: A privacy-preserving yet accountable ride-hailing service. In: Proceedings of the 26th USENIX Security Symposium (2017), \n                    http:\/\/infoscience.epfl.ch\/record\/228219","key":"1_CR14"},{"doi-asserted-by":"crossref","unstructured":"Piorkowski, M., Sarafijanovoc-Djukic, N., Grossglauser, M.: A parsimonious model of mobile partitioned networks with clustering. In: The First International Conference on COMmunication Systems and NETworkS (COMSNETS), January 2009. \n                    http:\/\/www.comsnets.org","key":"1_CR15","DOI":"10.1109\/COMSNETS.2009.4808865"},{"issue":"1","key":"1_CR16","first-page":"4","volume":"33","author":"JM Robbins","year":"2018","unstructured":"Robbins, J.M., Sechooler, A.M.: Once more unto the breach: What the equifax and uber data breaches reveal about the intersection of information security and the enforecement of securities laws. Crim. Justice 33(1), 4\u20137 (2018)","journal-title":"Crim. Justice"},{"issue":"11","key":"1_CR17","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"4","key":"1_CR18","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964723.383071","volume":"31","author":"I Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31(4), 149\u2013160 (2001)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"unstructured":"Tapscott, D., Tapscott, A.: Blockchain revolution: How the technology behindbitcoin is changing money, business, and the world. Penguin (2016)","key":"1_CR19"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:03:23Z","timestamp":1562785403000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}