{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:25Z","timestamp":1759132045014,"version":"3.40.5"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319150864"},{"type":"electronic","value":"9783319150871"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15087-1_17","type":"book-chapter","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T13:45:59Z","timestamp":1421847959000},"page":"216-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks"],"prefix":"10.1007","author":[{"given":"Fizza","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Ubaidullah","family":"Rajput","sequence":"additional","affiliation":[]},{"given":"Rasheed","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Hasoo","family":"Eun","sequence":"additional","affiliation":[]},{"given":"Heekuck","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,22]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Beach, A., Gartrell, M., Han, R.: Solutions to security and privacy issues in mobile social networking. In: IEEE International Conference on Computational Science and Engineering, pp. 1036\u20131042 (2009)","DOI":"10.1109\/CSE.2009.243"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JPROC.2011.2169033","volume":"99","author":"N Kayastha","year":"2011","unstructured":"Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc. IEEE 99, 2130\u20132158 (2011)","journal-title":"Proc. IEEE"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MPRV.2005.37","volume":"4","author":"N Eagle","year":"2005","unstructured":"Eagle, N., Pentland, A.: Social serendipity: mobilizing social software. IEEE J. Pervasive Comput. 4, 28\u201334 (2005)","journal-title":"IEEE J. Pervasive Comput."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Cox, L.P., Dalton, A., Marupadi, V.: SmokeScreen: flexible privacy control for presence-sharing. In: ACM 5th International Conference on Mobile Systems, Applications and Services, pp. 233\u2013245 (2007)","DOI":"10.1145\/1247660.1247688"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Pietilainen, A.K., Oliver, E., LeBrun, J., Varghese, G., Diot, C.: Mobiclique: middleware for mobile social networking. In: 2nd ACM Workshop on Online Social Networks (WOSN), pp. 49\u201354 (2009)","DOI":"10.1145\/1592665.1592678"},{"key":"17_CR6","unstructured":"Looptmix. http:\/\/www.looptmix.com"},{"key":"17_CR7","unstructured":"Gatsby. http:\/\/meetgatsby.com"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Yang, Z., Zhang, B., Dai, J., Champion, A., Xaun, D., Li, D.: E-SmallTalker: a distributed mobile system for social networking in physical proximity. In: IEEE International Conference on Distributed Computer System, pp. 468\u2013477 (2010)","DOI":"10.1109\/ICDCS.2010.56"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"MJ Freedman","year":"2004","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: ACM International Conference on Management of Data (SIGMOD), pp. 86\u201397 (2003)","DOI":"10.1145\/872757.872771"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Xie, Q., Hengartner, U.: Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: IEEE 9th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 252\u2013259 (2011)","DOI":"10.1109\/PST.2011.5971991"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhang, T., Li, H., Peng, J.: Efficient privacy preserving matchmaking for mobile social networking against malicious users. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 610\u2013615 (2012)","DOI":"10.1109\/TrustCom.2012.142"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, L., Li, X.Y., Liu, Y.: Message in a sealed bottle: privacy preserving friending in social networks. In: IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 327\u2013336 (2013)","DOI":"10.1109\/ICDCS.2013.38"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhang, Y., Sun, J., Yan, G.: Fine-grained private matching for proximity-based mobile social networking. In: IEEE INFOCOM, pp. 1969\u20131977 (2012)","DOI":"10.1109\/INFCOM.2012.6195574"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/JSAC.2013.SUP.0513057","volume":"31","author":"R Zhang","year":"2013","unstructured":"Zhang, R., Zhang, Y., Sun, J., Yan, G.: Privacy-preserving profile matching for proximity-based mobile social networking. IEEE J. Sel. Areas Commun. 31, 656\u2013668 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Fizza, A., Rasheed, H., Junggab, S., Heekuck, O.: Privacy preserving cloud-based computing platform (PPCCP) for using location based services. In: 6th IEEE\/ACM International Conference on Utility and Cloud Computing (UCC), pp. 60\u201366 (2013)","DOI":"10.1109\/UCC.2013.26"},{"key":"17_CR17","unstructured":"Torproject. https:\/\/www.torproject.org\/docs\/android.html.en"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1007\/978-3-642-03348-3_80","volume-title":"Advanced Data Mining and Applications","author":"F Zhang","year":"2009","unstructured":"Zhang, F., Zhao, G., Xing, T.: Privacy-preserving distributed k-nearest neighbor mining on horizontally partitioned multi-party data. In: Huang, R., Yang, Q., Pei, J., Gama, J., Meng, X., Li, X. (eds.) ADMA 2009. LNCS, vol. 5678, pp. 755\u2013762. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15087-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:23:11Z","timestamp":1747473791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15087-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319150864","9783319150871"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15087-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"22 January 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}