{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T03:13:04Z","timestamp":1777432384476,"version":"3.51.4"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030372279","type":"print"},{"value":"9783030372286","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37228-6_26","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:00:05Z","timestamp":1576490405000},"page":"532-548","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing"],"prefix":"10.1007","author":[{"given":"Lichuan","family":"Ma","sequence":"first","affiliation":[]},{"given":"Qingqi","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Kefeng","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"issue":"3","key":"26_CR1","doi-asserted-by":"publisher","first-page":"1732","DOI":"10.1109\/TNET.2015.2421897","volume":"24","author":"D Yang","year":"2016","unstructured":"Yang, D., Xue, G., Fang, X., et al.: Incentive mechanisms for crowdsensing: crowdsourcing with smartphones. IEEE\/ACM Trans. Netw. 24(3), 1732\u20131744 (2016)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"6","key":"26_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2017.1800112","volume":"25","author":"Y Qu","year":"2016","unstructured":"Qu, Y., Yu, S., Zhou, W., et al.: Privacy of things: emerging challenges and opportunities in wireless Internet of Things. IEEE Wirel. Commun. 25(6), 91\u201397 (2016)","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"26_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2017.1600679","volume":"55","author":"J Ni","year":"2017","unstructured":"Ni, J., Zhang, A., Lin, X., et al.: Security, privacy, and fairness in fog-based vehicular crowdsensing. IEEE Commun. Mag. 55(6), 146\u2013152 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"26_CR4","unstructured":"Min, M., Reddy, S., Shilton, K., et al.: PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. the 7th ACM International Conference on Mobile Systems. Applications, and Services, Krakow, Poland, pp. 55\u201368. ACM (2009)"},{"issue":"3","key":"26_CR5","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/JIOT.2017.2666783","volume":"4","author":"S Basudan","year":"2017","unstructured":"Basudan, S., Lin, X., Sankaranarayanan, K.: A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet Things J. 4(3), 772\u2013782 (2017)","journal-title":"IEEE Internet Things J."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Hicks, J., Ramanathan, N., Kim, D., et al. AndWellness: an open mobile system for activity and experience sampling. In: the 1st ACM SIGMOBILE International Conference on Pervasive Computing Technologies for Healthcare, Munich, Germany, pp. 34\u201343. ACM (2010)","DOI":"10.1145\/1921081.1921087"},{"key":"26_CR7","unstructured":"Fan, J., Li, Q., Cao, G.: Privacy-aware and trustworthy data aggregation in mobile sensing. In: The 3rd IEEE Conference on Communications and Network Security, Florence, Italy, pp. 31\u201339. IEEE (2015)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Pei, Q., Ma, L., Li, H., et al.: Reputation-based coalitional games for spectrum allocation in distributed cognitive radio networks. In: 2015 IEEE International Conference on Communications, London, UK, pp. 7269\u20137274. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249487"},{"issue":"1","key":"26_CR9","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/MSP.2013.2282414","volume":"31","author":"Y Liu","year":"2014","unstructured":"Liu, Y., Sun, Y.L.: Securing digital reputation in online social media. IEEE Signal Process. Mag. 31(1), 149\u2013155 (2014)","journal-title":"IEEE Signal Process. Mag."},{"issue":"12","key":"26_CR10","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TMC.2013.150","volume":"13","author":"XO Wang","year":"2014","unstructured":"Wang, X.O., Cheng, W., Mohapatra, P., et al.: Enabling reputation and trust in privacy-preserving mobile sensing. IEEE Trans. Mob. Comput. 13(12), 2777\u20132790 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/TDSC.2013.31","volume":"11","author":"Q Li","year":"2014","unstructured":"Li, Q., Cao, G., La Porta, T.F.: Efficient and privacy-aware data aggregation in mobile sensing. IEEE Trans. Dependable Secur. Comput. 11(2), 115\u2013129 (2014)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Lu, Y., Tang, Q., Wang, G.: ZebraLancer: private and anonymous crowdsourcing system atop open blockchain. In: the 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, pp. 853\u2013865. IEEE (2018)","DOI":"10.1109\/ICDCS.2018.00087"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Li, H., Chen, Q., Zhu, H., et al.: Privacy leakage via de-anonymization and aggregation in heterogeneous social networks. IEEE Trans. Dependable Secur. Comput. (2017, early access)","DOI":"10.1109\/TDSC.2017.2754249"},{"issue":"5","key":"26_CR14","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/TSC.2018.2825986","volume":"12","author":"L Ma","year":"2019","unstructured":"Ma, L., Liu, X., Pei, Q., et al.: Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing. IEEE Trans. Serv. Comput. 12(5), 786\u2013799 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"8","key":"26_CR15","first-page":"3690","volume":"14","author":"Z Li","year":"2018","unstructured":"Li, Z., Kang, J., Rong, Y., et al.: Consortium blockchain for secure energy trading in industrial Internet of Things. IEEE Trans. Ind. Inform. 14(8), 3690\u20133700 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"5","key":"26_CR16","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TSC.2018.2853167","volume":"12","author":"L Ruinian","year":"2019","unstructured":"Ruinian, L., Tianyi, S., Bo, M., et al.: Blockchain for large-scale Internet of Things data storage and protection. IEEE Trans. Serv. Comput. 12(5), 762\u2013771 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"26_CR17","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Z Yang","year":"2019","unstructured":"Yang, Z., Yang, K., Lei, L., et al.: Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6(2), 1495\u20131505 (2019)","journal-title":"IEEE Internet Things J."},{"key":"26_CR18","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Working paper (2008)"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"issue":"3","key":"26_CR20","first-page":"369","volume":"13","author":"X Yi","year":"2016","unstructured":"Yi, X., Bouguettaya, A., Georgakopoulos, D., et al.: Privacy protection for wireless medical sensor data. IEEE Internet Things J. 13(3), 369\u2013380 (2016)","journal-title":"IEEE Internet Things J."},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.comnet.2014.07.012","volume":"72","author":"X Kang","year":"2014","unstructured":"Kang, X., Wu, Y.: A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput. Netw. 72, 62\u201373 (2014)","journal-title":"Comput. Netw."},{"issue":"1","key":"26_CR22","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.snb.2009.08.041","volume":"143","author":"SD Vito","year":"2009","unstructured":"Vito, S.D., Piga, M., Martinotto, L., et al.: On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario. Sens. Actuators B Chem. 143(1), 182\u2013191 (2009)","journal-title":"Sens. Actuators B Chem."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37228-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T15:10:31Z","timestamp":1665241831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37228-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030372279","9783030372286"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37228-6_26","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}