{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:13Z","timestamp":1742913373438,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_21","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"262-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing"],"prefix":"10.1007","author":[{"given":"Haleh","family":"Amintoosi","sequence":"first","affiliation":[]},{"given":"Salil S.","family":"Kanhere","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"key":"21_CR1","unstructured":"Burke, J., et al.: Participatory sensing. In: WSW Workshop, ACM SenSys\u201906 (2006)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Reddy, S., et al.: Image browsing, processing, and clustering for participatory sensing: lessons from a DietSense prototype. In: ACM EmNets\u201907, pp. 13\u201317 (2007)","DOI":"10.1145\/1278972.1278975"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Stuntebeck, E.P., et al.: HealthSense: classification of health-related sensor data through user-assisted machine learning. In: HotMobile\u201908, pp. 1\u20135 (2008)","DOI":"10.1145\/1411759.1411761"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-540-69170-9_10","volume-title":"Distributed Computing in Sensor Systems","author":"YF Dong","year":"2008","unstructured":"Dong, Y.F., Kanhere, S.S., Chou, C.T., Bulusu, N.: Automatic collection of fuel prices from a network of mobile cameras. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol. 5067, pp. 140\u2013156. Springer, Heidelberg (2008)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Rana, R.K., Chou, C.T., Kanhere, S.S., Bulusu, N., Hu, W.: Ear-phone: an end-to-end participatory urban noise mapping. In: ACM\/IEEE IPSN\u201910 (2010)","DOI":"10.1145\/1791212.1791226"},{"key":"21_CR6","unstructured":"Krontiris, I., Freiling, F.: Urban sensing through social networks: the tension between participation and privacy. In: ITWDC\u201910 (2010)"},{"key":"21_CR7","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/978-3-642-40238-8_20","volume-title":"Mobile and Ubiquitous Systems: Computing, Networking, and Services","author":"H Amintoosi","year":"2013","unstructured":"Amintoosi, H., Kanhere, S.S.: A trust framework for social participatory sensing systems. In: Zheng, K., Li, M., Jiang, H. (eds.) MobiQuitous 2012. LNICST, vol. 120, pp. 237\u2013249. Springer, Heidelberg (2013)"},{"issue":"1","key":"21_CR8","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/s11036-013-0455-x","volume":"19","author":"H Amintoosi","year":"2014","unstructured":"Amintoosi, H., Kanhere, S.S.: A reputation framework for social participatory sensing systems. J. Mobile Netw. Appl. 19(1), 88\u2013100 (2014)","journal-title":"J. Mobile Netw. Appl."},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Amintoosi, H., Kanhere, S.S.: A trust based recruitment framework for social participatory sensing. In: IEEE DCOSS\u201913 (2013)","DOI":"10.1109\/DCOSS.2013.29"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzz. Knowl.-Based Syst. 10(05), 571\u2013588 (2002)","DOI":"10.1142\/S021848850200165X"},{"key":"21_CR11","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-15257-3_8","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"M Huber","year":"2010","unstructured":"Huber, M., Mulazzani, M., Weippl, E.: Who on earth is \u201cMr. Cypher\u201d: automated friend injection attacks on social networking sites. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol. 330, pp. 80\u201389. Springer, Heidelberg (2010)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Huang, K.L., Kanhere, S.S., Hu, W.: A privacy-preserving reputation system for participatory sensing. In: IEEE LCN\u201912 (2012)","DOI":"10.1109\/LCN.2012.6423585"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1016\/j.jss.2011.06.073","volume":"84","author":"D Christin","year":"2011","unstructured":"Christin, D., Reinhardt, A., Kanhere, S.S., Hollick, M.: A survey on privacy in mobile participatory sensing applications. J. Syst. Softw. 84, 1928\u20131946 (2011)","journal-title":"J. Syst. Softw."},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Daly, E., Haahr, M.: Social network analysis for routing in disconnected delay-tolerant MANETs. In: ACM MobiHoc\u2019 07 (2007)","DOI":"10.1145\/1288107.1288113"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Hui, P., Crowcroft, J., Yoneki, E.: BUBBLE Rap: social based forwarding in delay tolerant networks. In: ACM MobiHoc\u201908 (2008)","DOI":"10.1145\/1374618.1374652"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Mashhadi, A.J., et al.: Habit: leveraging human mobility and social network for efficient content dissemination in delay tolerant networks. In: WoWMoM\u201909 (2009)","DOI":"10.1109\/WOWMOM.2009.5282467"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Mtibaa, A., et al.: PeopleRank, social opportunistic forwarding. In: INFOCOM\u201910 (2010)","DOI":"10.1109\/INFCOM.2010.5462261"},{"issue":"5","key":"21_CR18","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1016\/j.pmcj.2008.04.003","volume":"4","author":"C Boldrini","year":"2008","unstructured":"Boldrini, C., et al.: Exploiting users\u2019 social relations to forward data in opportunistic networks: the HiBOp solution. Perv. Mobile Comput. 4(5), 633\u2013657 (2008)","journal-title":"Perv. Mobile Comput."},{"issue":"13","key":"21_CR19","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1016\/j.comcom.2010.04.035","volume":"33","author":"A Shikfa","year":"2010","unstructured":"Shikfa, A., \u00d6nen, M., Molva, R.: Privacy and confidentiality in context-based and epidemic forwarding. Comput. Commun. 33(13), 1493\u20131504 (2010)","journal-title":"Comput. Commun."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Aad, I., et al.: Packet coding for strong anonymity in ad hoc networks. In: IEEE SecureComm\u201906 (2006)","DOI":"10.1109\/SECCOMW.2006.359571"},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D Goldschlag","year":"1999","unstructured":"Goldschlag, D., et al.: Onion routing. Commun. ACM 42, 39\u201341 (1999)","journal-title":"Commun. ACM"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Hasan, O., et al.: Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments. In: ACM ICPS\u201909 (2009)","DOI":"10.1145\/1568199.1568207"},{"key":"21_CR23","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-1-4419-8462-3_10","volume-title":"Social Network Data Analytics","author":"E Zheleva","year":"2011","unstructured":"Zheleva, E., Getoor, L.: Privacy in social networks: a survey. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 277\u2013306. Springer, New York (2011)"},{"issue":"3","key":"21_CR24","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Smith, G.: Quantifying information flow using min-entropy. In: IEEE QEST\u201911 (2011)","DOI":"10.1109\/QEST.2011.31"},{"key":"21_CR26","unstructured":"Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: 7th USENIX Security Symposium (1998)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T21:43:02Z","timestamp":1676410982000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_21","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}