{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:08:37Z","timestamp":1751602117277,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_17","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T10:03:21Z","timestamp":1523354601000},"page":"339-355","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications"],"prefix":"10.1007","author":[{"given":"Fengwei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Fen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"issue":"6090","key":"17_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1126\/science.1217330","volume":"337","author":"TW Valente","year":"2012","unstructured":"Valente, T.W.: Network interventions. Science 337(6090), 49\u201353 (2012)","journal-title":"Science"},{"issue":"9","key":"17_CR2","doi-asserted-by":"publisher","first-page":"7729","DOI":"10.1109\/TVT.2015.2499791","volume":"65","author":"H Zhu","year":"2016","unstructured":"Zhu, H., Lu, R., Huang, C., Chen, L., Li, H.: An efficient privacy-preserving location based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 65(9), 7729\u20137739 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"doi-asserted-by":"crossref","unstructured":"Puttaswamy, K.P., Zhao, B.Y.: Preserving privacy in location-based mobile social applications. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, pp. 1\u20136. ACM (2010)","key":"17_CR3","DOI":"10.1145\/1734583.1734585"},{"doi-asserted-by":"crossref","unstructured":"Li, K.A., Sohn, T.Y., Huang, S., Griswold, W.G.: Peopletones: a system for the detection and notification of buddy proximity on mobile phones. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 160\u2013173. ACM (2008)","key":"17_CR4","DOI":"10.1145\/1378600.1378619"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MPRV.2015.39","volume":"14","author":"M Bolic","year":"2015","unstructured":"Bolic, M., Rostamian, M., Djuric, P.M.: Proximity detection with RFID: a step toward the internet of things. IEEE Pervasive Comput. 14(2), 70\u201376 (2015)","journal-title":"IEEE Pervasive Comput."},{"doi-asserted-by":"crossref","unstructured":"Huang, C., Lu, R., Zhu, H., Shao, J., Alamer, A., Lin, X.: EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","key":"17_CR6","DOI":"10.1109\/ICC.2016.7511194"},{"doi-asserted-by":"crossref","unstructured":"Chen, Q., Ye, A., Xu, L.: A privacy-preserving proximity detection method in social network. In: Proceedings of the International Conference on Internet of Things and Cloud Computing. ACM (2016). Article No. 68","key":"17_CR7","DOI":"10.1145\/2896387.2900320"},{"doi-asserted-by":"crossref","unstructured":"\u0160ik\u0161nys, L., Thomsen, J.R., \u0160altenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: 2010 Eleventh International Conference on Mobile Data Management, pp. 75\u201384. IEEE (2010)","key":"17_CR8","DOI":"10.1109\/MDM.2010.43"},{"issue":"2","key":"17_CR9","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1109\/JIOT.2016.2553083","volume":"4","author":"H Zhu","year":"2016","unstructured":"Zhu, H., Liu, F., Li, H.: Efficient and privacy-preserving polygons spatial query framework for location-based services. IEEE Internet Things J. 4(2), 536\u2013545 (2016)","journal-title":"IEEE Internet Things J."},{"issue":"6221","key":"17_CR10","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1126\/science.347.6221.498","volume":"347","author":"M Enserink","year":"2015","unstructured":"Enserink, M.: Risk of exposure. Science 347(6221), 498\u2013500 (2015)","journal-title":"Science"},{"issue":"8","key":"17_CR11","doi-asserted-by":"publisher","first-page":"1847","DOI":"10.1109\/TIFS.2016.2561241","volume":"11","author":"L Li","year":"2016","unstructured":"Li, L., Lu, R., Choo, K.K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847\u20131861 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Peng, J., Meng, Y., Xue, M., Hei, X., Ross, K.W.: Attacks and defenses in location-based social networks: a heuristic number theory approach. In: 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 64\u201371. IEEE (2015)","key":"17_CR12","DOI":"10.1109\/SocialSec2015.19"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"9225","DOI":"10.1109\/ACCESS.2017.2647824","volume":"4","author":"C Huang","year":"2016","unstructured":"Huang, C., Yan, Z., Li, N., Wang, M.: Secure pervasive social communications based on trust in a distributed way. IEEE Access 4, 9225\u20139238 (2016)","journal-title":"IEEE Access"},{"issue":"4","key":"17_CR14","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TIFS.2015.2506145","volume":"11","author":"B Wang","year":"2016","unstructured":"Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704\u2013719 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.future.2014.10.026","volume":"49","author":"B Niu","year":"2015","unstructured":"Niu, B., Zhu, X., Li, Q., Chen, J., Li, H.: A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49, 125\u2013132 (2015)","journal-title":"Future Gener. Comput. Syst."},{"issue":"165","key":"17_CR16","doi-asserted-by":"publisher","first-page":"165cm15","DOI":"10.1126\/scitranslmed.3004454","volume":"4","author":"L Ohno-Machado","year":"2012","unstructured":"Ohno-Machado, L.: To share or not to share: that is not the question. Sci. Transl. Med. 4(165), 165cm15 (2012)","journal-title":"Sci. Transl. Med."},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2014.6863131","volume":"28","author":"R Lu","year":"2014","unstructured":"Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46\u201350 (2014)","journal-title":"IEEE Netw."},{"issue":"10","key":"17_CR18","first-page":"1937","volume":"6","author":"Q Wang","year":"2011","unstructured":"Wang, Q., Xu, C., Sun, M.: Multi-dimensional k-anonymity based on mapping for protecting privacy. J. Softw. 6(10), 1937\u20131944 (2011)","journal-title":"J. Softw."},{"doi-asserted-by":"crossref","unstructured":"Sharma, V., Shen, C.C.: Evaluation of an entropy-based k-anonymity model for location based services. In: 2015 International Conference on Computing, Networking and Communications (ICNC), pp. 374\u2013378. IEEE (2015)","key":"17_CR19","DOI":"10.1109\/ICCNC.2015.7069372"},{"doi-asserted-by":"crossref","unstructured":"Firoozjaei, M.D., Yu, J., Kim, H.: Privacy preserving nearest neighbor search based on topologies in cellular networks. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 146\u2013149. IEEE (2015)","key":"17_CR20","DOI":"10.1109\/WAINA.2015.22"},{"issue":"2","key":"17_CR21","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10707-009-0099-y","volume":"15","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351\u2013380 (2011)","journal-title":"GeoInformatica"},{"issue":"6","key":"17_CR22","doi-asserted-by":"publisher","first-page":"1546","DOI":"10.1109\/TKDE.2016.2520473","volume":"28","author":"X Yi","year":"2016","unstructured":"Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546\u20131559 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"05","key":"17_CR23","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"issue":"1","key":"17_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mobile Comput. 7(1), 1\u201318 (2008)","journal-title":"IEEE Trans. Mobile Comput."},{"doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, X.S.: In-device spatial cloaking for mobile user privacy assisted by the cloud. In: 2010 Eleventh International Conference on Mobile Data Management, pp. 381\u2013386. IEEE (2010)","key":"17_CR25","DOI":"10.1109\/MDM.2010.82"},{"doi-asserted-by":"crossref","unstructured":"Mu, B., Bakiras, S.: Private proximity detection for convex polygons. In: Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess, pp. 36\u201343. ACM (2013)","key":"17_CR26","DOI":"10.1145\/2486084.2486087"},{"doi-asserted-by":"crossref","unstructured":"Hu, P., Mukherjee, T., Valliappan, A., Radziszowski, S.: Homomorphic proximity computation in geosocial networks. In: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 616\u2013621. IEEE (2016)","key":"17_CR27","DOI":"10.1109\/INFCOMW.2016.7562150"},{"issue":"1","key":"17_CR28","first-page":"1","volume":"9","author":"T Thomas","year":"2009","unstructured":"Thomas, T.: Secure two-party protocols for point inclusion problem. Int. J. Netw. Secur. 9(1), 1\u20137 (2009)","journal-title":"Int. J. Netw. Secur."},{"issue":"4","key":"17_CR29","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/0097-8493(95)00037-D","volume":"19","author":"F Feito","year":"1995","unstructured":"Feito, F., Torres, J.C., Urena, A.: Orientation, simplicity, and inclusion test for planar polygons. Comput. Graph. 19(4), 595\u2013600 (1995)","journal-title":"Comput. Graph."},{"issue":"3","key":"17_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JBHI.2016.2518858","volume":"21","author":"H Zhu","year":"2016","unstructured":"Zhu, H., Liu, X., Lu, R., Li, H.: Efficient and privacy-preserving online medical pre-diagnosis framework using nonlinear SVM. IEEE J. Biomed. Health Inform. 21(3), 1 (2016)","journal-title":"IEEE J. Biomed. Health Inform."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T15:10:35Z","timestamp":1751555435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}