{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:20:21Z","timestamp":1743042021079,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319968926"},{"type":"electronic","value":"9783319968933"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-96893-3_2","type":"book-chapter","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T11:30:49Z","timestamp":1531999849000},"page":"19-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Privacy-Preserving Travel-Time-First Task Assignment in Spatial Crowdsourcing"],"prefix":"10.1007","author":[{"given":"Jian","family":"Li","sequence":"first","affiliation":[]},{"given":"An","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weiqi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhixu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guanfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"issue":"4","key":"2_CR1","first-page":"14","volume":"39","author":"L Chen","year":"2016","unstructured":"Chen, L., Shahabi, C.: Spatial crowdsourcing: challenges and opportunities. IEEE Data Eng. Bull. 39(4), 14\u201325 (2016)","journal-title":"IEEE Data Eng. Bull."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Kazemi, L., Shahabi, C.: GeoCrowd: enabling query answering with spatial crowdsourcing. In: SIGSPATIAL, pp. 189\u2013198 (2012)","DOI":"10.1145\/2424321.2424346"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Deng, D., Shahabi, C., Demiryurek, U.: Maximizing the number of worker\u2019s self-selected tasks in spatial crowdsourcing. In: SIGSPATIAL, pp. 324\u2013333 (2013)","DOI":"10.1145\/2525314.2525370"},{"issue":"10","key":"2_CR4","first-page":"1022","volume":"8","author":"P Cheng","year":"2015","unstructured":"Cheng, P., Lian, X., Chen, Z., Fu, R., Chen, L., Han, J., Zhao, J.: Reliable diversity-based spatial crowdsourcing by moving workers. PVLDB 8(10), 1022\u20131033 (2015)","journal-title":"PVLDB"},{"issue":"4","key":"2_CR5","first-page":"934","volume":"16","author":"H To","year":"2017","unstructured":"To, H., Ghinita, G., Fan, L., Shahabi, C.: Differentially private location protection for worker datasets in spatial crowdsourcing. TMC 16(4), 934\u2013949 (2017)","journal-title":"TMC"},{"key":"2_CR6","unstructured":"Liu, B., Chen, L., Zhu, X., Zhang, Y., Zhang, C., Qiu, W.: Protecting location privacy in spatial crowdsourcing using encrypted data. In: EDBT, pp. 478\u2013481 (2017)"},{"issue":"10","key":"2_CR7","first-page":"919","volume":"7","author":"H To","year":"2014","unstructured":"To, H., Ghinita, G., Shahabi, C.: A framework for protecting worker location privacy in spatial crowdsourcing. PVLDB 7(10), 919\u2013930 (2014)","journal-title":"PVLDB"},{"issue":"5","key":"2_CR8","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1007\/s11390-017-1772-5","volume":"32","author":"A Liu","year":"2017","unstructured":"Liu, A., Li, Z., Liu, G., Zheng, K., Zhang, M., Li, Q., Zhang, X.: Privacy-preserving task assignment in spatial crowdsourcing. J. Comput. Sci. Technol. 32(5), 905\u2013918 (2017)","journal-title":"J. Comput. Sci. Technol."},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10707-017-0305-2","volume":"22","author":"A Liu","year":"2018","unstructured":"Liu, A., Wang, W., Shang, S., Li, Q., Zhang, X.: Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. GeoInformatica 22(2), 335\u2013362 (2018)","journal-title":"GeoInformatica"},{"issue":"8","key":"2_CR10","first-page":"2201","volume":"28","author":"P Cheng","year":"2016","unstructured":"Cheng, P., Lian, X., Chen, L., Han, J., Zhao, J.: Task assignment on multi-skill oriented spatial crowdsourcing. TKDE 28(8), 2201\u20132215 (2016)","journal-title":"TKDE"},{"issue":"9","key":"2_CR11","first-page":"1943","volume":"29","author":"L Zheng","year":"2017","unstructured":"Zheng, L., Chen, L.: Maximizing acceptance in rejection-aware spatial crowdsourcing. TKDE 29(9), 1943\u20131956 (2017)","journal-title":"TKDE"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Tong, Y., She, J., Ding, B., Wang, L., Chen, L.: Online mobile micro-task allocation in spatial crowdsourcing. In: ICDE, pp. 49\u201360 (2016)","DOI":"10.1109\/ICDE.2016.7498228"},{"issue":"11","key":"2_CR13","first-page":"1334","volume":"10","author":"Y Tong","year":"2017","unstructured":"Tong, Y., Wang, L., Zhou, Z., Ding, B., Chen, L., Ye, J., Xu, K.: Flexible online task assignment in real-time spatial data. PVLDB 10(11), 1334\u20131345 (2017)","journal-title":"PVLDB"},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/s41019-017-0037-1","volume":"2","author":"D Gao","year":"2017","unstructured":"Gao, D., Tong, Y., She, J., Song, T., Chen, L., Xu, K.: Top-k team recommendation and its variants in spatial crowdsourcing. Data Sci. Eng. 2(2), 136\u2013150 (2017)","journal-title":"Data Sci. Eng."},{"issue":"5","key":"2_CR15","first-page":"1200","volume":"26","author":"R Paulet","year":"2014","unstructured":"Paulet, R., Kaosar, M.G., Yi, X., Bertino, E.: Privacy-preserving and content-protecting location based queries. TKDE 26(5), 1200\u20131210 (2014)","journal-title":"TKDE"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-319-32049-6_19","volume-title":"Database Systems for Advanced Applications","author":"S Liu","year":"2016","unstructured":"Liu, S., et al.: Efficient query processing with mutual privacy protection for location-based services. In: Navathe, S.B., Wu, W., Shekhar, S., Du, X., Wang, X.S., Xiong, H. (eds.) DASFAA 2016. LNCS, vol. 9643, pp. 299\u2013313. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-32049-6_19"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical k nearest neighbor queries with location privacy. In: ICDE, pp. 640\u2013651 (2014)","DOI":"10.1109\/ICDE.2014.6816688"},{"issue":"6","key":"2_CR18","first-page":"1546","volume":"28","author":"X Yi","year":"2016","unstructured":"Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. TKDE 28(6), 1546\u20131559 (2016)","journal-title":"TKDE"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-319-68786-5_21","volume-title":"Web Information Systems Engineering \u2013 WISE 2017","author":"Y Sun","year":"2017","unstructured":"Sun, Y., Liu, A., Li, Z., Liu, G., Zhao, L., Zheng, K.: Anonymity-based privacy-preserving task assignment in spatial crowdsourcing. In: Bouguettaya, A., et al. (eds.) WISE 2017. LNCS, vol. 10570, pp. 263\u2013277. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68786-5_21"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Liu, A., Zheng, K., Li, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: ICDE, pp. 66\u201377 (2015)","DOI":"10.1109\/ICDE.2015.7113273"},{"key":"2_CR21","volume-title":"The Foundations of Cryptography - Volume 2, Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich, O.: The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, Cambridge (2004)"},{"key":"2_CR22","unstructured":"Reddaway, S.: Pseudo-random number generators. US, pp. 57\u201367 (1974)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 99","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"issue":"4","key":"2_CR24","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"2_CR25","first-page":"115","volume":"11","author":"Q Li","year":"2014","unstructured":"Li, Q., Cao, G., La Porta, T.F.: Efficient and privacy-aware data aggregation in mobile sensing. TDSC 11(2), 115\u2013129 (2014)","journal-title":"TDSC"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-96893-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:53:27Z","timestamp":1710330807000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-96893-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319968926","9783319968933"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-96893-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"19 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APWeb-WAIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apwebwaim2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conferences.cis.umac.mo\/apwebwaim2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}