{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:02:51Z","timestamp":1725840171533},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238012"},{"type":"electronic","value":"9783319238029"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23802-9_5","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T12:24:43Z","timestamp":1448972683000},"page":"33-40","source":"Crossref","is-referenced-by-count":3,"title":["Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks"],"prefix":"10.1007","author":[{"given":"Ben","family":"Niu","sequence":"first","affiliation":[]},{"given":"Xiuguang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiaoqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of ACM SIGMOD (2003)","DOI":"10.1145\/872757.872771"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-642-14577-3_13","volume-title":"Financial Cryptography and Data Security","author":"E Cristofaro De","year":"2010","unstructured":"De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear complexity. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 143\u2013159. Springer, Heidelberg (2010)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/978-3-642-17373-8_13","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"E Cristofaro De","year":"2010","unstructured":"De Cristofaro, E., Kim, J., Tsudik, G.: Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213\u2013231. Springer, Heidelberg (2010)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-24676-3_1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"MJ Freedman","year":"2004","unstructured":"Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1\u201319. Springer, Heidelberg (2004)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Li, M., Cao, N., Yu, S., Lou, W.: Findu: Privacy-preserving personal profile matching in mobile social networks. In: Proceedings of IEEE INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"5_CR6","unstructured":"Niu, B., Zhu, X., Liu, J., Li, Z., Li, H.: Weight-aware private matching scheme for proximity-based mobile social networks. In: Proceedings of IEEE GLOBECOM (2013)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Niu, B., Zhu, X., Zhang, T., Chi, H., Li, H.: P-match: Priority-aware friend discovery for proximity-based mobile social networks. In: Proceedings of IEEE MASS (2013)","DOI":"10.1109\/MASS.2013.70"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Sun, J., Zhang, R., Zhang, Y.: Privacy-preserving spatiotemporal matching. In: Proceedings of IEEE INFOCOM (2013)","DOI":"10.1109\/INFCOM.2013.6566867"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Y., ting Zhang, T., zong Li, H., ping He, L., Peng, J.: Efficient privacy preserving matchmaking for mobile social networking against malicious users. In: Proceedings of IEEE TRUSTCOM (2012)","DOI":"10.1109\/TrustCom.2012.142"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhang, Y., Sun, J., Yan, G.: Fine-grained private matching for proximity-based mobile social networking. In: Proceedings of IEEE INFOCOM (2012)","DOI":"10.1109\/INFCOM.2012.6195574"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","International Conference on Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23802-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T03:32:38Z","timestamp":1567395158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23802-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238012","9783319238029"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23802-9_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}