{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:45:46Z","timestamp":1743036346617,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031542039"},{"type":"electronic","value":"9783031542046"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54204-6_28","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T19:02:53Z","timestamp":1709233373000},"page":"474-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security and\u00a0Privacy for\u00a0Mobile Crowdsensing: Improving User Relevance and\u00a0Privacy"],"prefix":"10.1007","author":[{"given":"Cihan","family":"Eryonucu","sequence":"first","affiliation":[]},{"given":"Panos","family":"Papadimitratos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Kiltz, E., Neven, G.: Generalized key delegation for hierarchical identity-based encryption. Cryptology ePrint Archive, Paper 2007\/221 (2007)","DOI":"10.1007\/978-3-540-74835-9_10"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Borsub, J., Papadimitratos, P.: Hardened registration process for participatory sensing. In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. Association for Computing Machinery (2018)","DOI":"10.1145\/3212480.3226109"},{"issue":"2","key":"28_CR3","doi-asserted-by":"publisher","first-page":"S82","DOI":"10.1088\/0952-4746\/36\/2\/S82","volume":"36","author":"A Brown","year":"2016","unstructured":"Brown, A., Franken, P., Bonner, S., Dolezal, N., Moross, J.: Safecast: successful citizen-science for radiation measurement and communication after Fukushima. J. Radiol. Prot. 36(2), S82\u2013S101 (2016)","journal-title":"J. Radiol. Prot."},{"issue":"3","key":"28_CR4","doi-asserted-by":"publisher","first-page":"4525","DOI":"10.1109\/JSYST.2021.3099103","volume":"16","author":"J Chen","year":"2022","unstructured":"Chen, J., Liu, Y., Xiang, Y., Sood, K.: RPPTD: robust privacy-preserving truth discovery scheme. IEEE Syst. J. 16(3), 4525\u20134531 (2022)","journal-title":"IEEE Syst. J."},{"issue":"12","key":"28_CR5","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/TIFS.2013.2287092","volume":"8","author":"E De Cristofaro","year":"2013","unstructured":"De Cristofaro, E., Soriente, C.: Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI). IEEE Trans. Inf. Forensics Secur. 8(12), 2021\u20132033 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Eryonucu, C., Papadimitratos, P.: Sybil-based attacks on google maps or how to forge the image of city life. In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (2022)","DOI":"10.1145\/3507657.3528538"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Giannetsos, T., Gisdakis, S., Papadimitratos, P.: Trustworthy people-centric sensing: privacy, security and user incentives road-map. In: 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET) (2014)","DOI":"10.1109\/MedHocNet.2014.6849103"},{"issue":"5","key":"28_CR8","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/JIOT.2016.2560768","volume":"3","author":"S Gisdakis","year":"2016","unstructured":"Gisdakis, S., Giannetsos, T., Papadimitratos, P.: Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J. 3(5), 839\u2013853 (2016)","journal-title":"IEEE Internet Things J."},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Gisdakis, S., Giannetsos, T., Papadimitratos, P.: SPPEAR: security and privacy-preserving architecture for participatory-sensing applications. In: ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2014)","DOI":"10.1145\/2627393.2627402"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Gisdakis, S., Giannetsos, T., Papadimitratos, P.: SHIELD: a data verification framework for participatory sensing systems. In: ACM Conference on Security & Privacy in Wireless and Mobile Networks (ACM WiSec) (2015)","DOI":"10.1145\/2766498.2766503"},{"key":"28_CR11","unstructured":"Google: Popular times, wait times, and visit duration. https:\/\/support.google.com\/business\/answer\/6263531. Accessed 19 June 2013"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Grube\u0161a, S., Peto\u0161i\u0107, A., Suhanek, M., Durek, I.: Mobile crowdsensing accuracy for noise mapping in smart cities. Automatika (2018)","DOI":"10.1080\/00051144.2018.1534927"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-319-12280-9_21","volume-title":"Cryptology and Network Security","author":"F G\u00fcnther","year":"2014","unstructured":"G\u00fcnther, F., Manulis, M., Peter, A.: Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 321\u2013336. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12280-9_21"},{"key":"28_CR14","unstructured":"Help, W.: How does waze work? https:\/\/support.google.com\/waze\/answer\/6078702. Accessed 17 June 2023"},{"key":"28_CR15","unstructured":"Kumar, S., Hu, Y., Andersen, M.P., Popa, R.A., Culler, D.E.: JEDI: many-to-many end-to-end encryption and key delegation for IoT. In: 28th USENIX Security Symposium (USENIX Security 2019). USENIX Association (2019)"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Lu, Y., Tang, Q., Wang, G.: ZebraLancer: private and anonymous crowdsourcing system atop open blockchain. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (2018)","DOI":"10.1109\/ICDCS.2018.00087"},{"issue":"3","key":"28_CR17","doi-asserted-by":"publisher","first-page":"5651","DOI":"10.1109\/JIOT.2019.2904704","volume":"6","author":"T Luo","year":"2019","unstructured":"Luo, T., Huang, J., Kanhere, S.S., Zhang, J., Das, S.K.: Improving IoT data quality in mobile crowd sensing: a cross validation approach. IEEE Internet Things J. 6(3), 5651\u20135664 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"28_CR18","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TMC.2019.2908638","volume":"19","author":"J Ni","year":"2020","unstructured":"Ni, J., Zhang, K., Xia, Q., Lin, X., Shen, X.S.: Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing. IEEE Trans. Mob. Comput. 19(6), 1317\u20131331 (2020)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"28_CR19","unstructured":"OAuth2: Oauth2 access tokens. https:\/\/oauth.net\/2\/"},{"key":"28_CR20","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/2935694.2935700","volume":"44","author":"L Pournajaf","year":"2016","unstructured":"Pournajaf, L., Garcia-Ulloa, D.A., Xiong, L., Sunderam, V.: Participant privacy in mobile crowd sensing task management: a survey of methods and challenges. ACM SIGMOD Rec. 44, 23\u201334 (2016)","journal-title":"ACM SIGMOD Rec."},{"issue":"1","key":"28_CR21","first-page":"1","volume":"15","author":"F Restuccia","year":"2018","unstructured":"Restuccia, F., Ferraro, P., Sanders, T.S., Silvestri, S., Das, S.K., Re, G.L.: FIRST: a framework for optimizing information quality in mobile crowdsensing systems. ACM Trans. Sens. Netw. (TOSN) 15(1), 1\u201335 (2018)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"issue":"9","key":"28_CR22","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"JH Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63(9), 1278\u20131308 (1975)","journal-title":"Proc. IEEE"},{"key":"28_CR23","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.pmcj.2010.04.001","volume":"7","author":"M Shin","year":"2011","unstructured":"Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N.: AnonySense: a system for anonymous opportunistic sensing. Pervasive Mob. Comput. 7, 16\u201330 (2011)","journal-title":"Pervasive Mob. Comput."},{"key":"28_CR24","unstructured":"Tschofenig, H., Pegourie-Gonnard, M.: Performance of state-of-the-art cryptography on arm-based microprocessors. In: NIST Lightweight Cryptography Workshop, vol. 2015 (2015)"},{"issue":"6","key":"28_CR25","doi-asserted-by":"publisher","first-page":"2294","DOI":"10.1109\/TNET.2019.2944984","volume":"27","author":"H Wu","year":"2019","unstructured":"Wu, H., Wang, L., Xue, G., Tang, J., Yang, D.: Enabling data trustworthiness and user privacy in mobile crowdsensing. IEEE\/ACM Trans. Networking 27(6), 2294\u20132307 (2019)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"9","key":"28_CR26","doi-asserted-by":"publisher","first-page":"6956","DOI":"10.1109\/JIOT.2021.3113997","volume":"9","author":"HT Wu","year":"2022","unstructured":"Wu, H.T., Zheng, Y., Zhao, B., Hu, J.: An anonymous reputation management system for mobile crowdsensing based on dual blockchain. IEEE Internet Things J. 9(9), 6956\u20136968 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"20","key":"28_CR27","doi-asserted-by":"publisher","first-page":"19868","DOI":"10.1109\/JIOT.2022.3168745","volume":"9","author":"X Yan","year":"2022","unstructured":"Yan, X., Zeng, B., Zhang, X.: Privacy-preserving and customization-supported data aggregation in mobile crowdsensing. IEEE Internet Things J. 9(20), 19868\u201319880 (2022)","journal-title":"IEEE Internet Things J."},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, X., Lu, R., Ray, S., Shao, J., Ghorbani, A.A.: Spatio-temporal similarity based privacy-preserving worker selection in mobile crowdsensing. In: 2021 IEEE Global Communications Conference (GLOBECOM) (2021)","DOI":"10.1109\/GLOBECOM46510.2021.9685450"},{"issue":"24","key":"28_CR29","doi-asserted-by":"publisher","first-page":"17584","DOI":"10.1109\/JIOT.2021.3081596","volume":"8","author":"B Zhao","year":"2021","unstructured":"Zhao, B., Liu, X., Chen, W.N., Liang, W., Zhang, X., Deng, R.H.: PRICE: privacy and reliability-aware real-time incentive system for crowdsensing. IEEE Internet Things J. 8(24), 17584\u201317595 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"16","key":"28_CR30","doi-asserted-by":"publisher","first-page":"14803","DOI":"10.1109\/JIOT.2021.3084937","volume":"9","author":"S Zou","year":"2022","unstructured":"Zou, S., Xi, J., Xu, G., Zhang, M., Lu, Y.: CrowdHB: a decentralized location privacy-preserving crowdsensing system based on a hybrid blockchain network. IEEE Internet Things J. 9(16), 14803\u201314817 (2022)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54204-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T19:07:13Z","timestamp":1709233633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54204-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031542039","9783031542046"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54204-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}