{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:43:20Z","timestamp":1725893000296},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333910"},{"type":"electronic","value":"9783642333927"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33392-7_11","type":"book-chapter","created":{"date-parts":[[2012,8,20]],"date-time":"2012-08-20T00:58:44Z","timestamp":1345424324000},"page":"93-106","source":"Crossref","is-referenced-by-count":20,"title":["PEPPeR: A Querier\u2019s Privacy Enhancing Protocol for PaRticipatory Sensing"],"prefix":"10.1007","author":[{"given":"Tassos","family":"Dimitriou","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Krontiris","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Sabouri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.3233\/IP-2010-0200","volume":"15","author":"N. Maisonneuve","year":"2010","unstructured":"Maisonneuve, N., Stevens, M., Ochab, B.: Participatory noise pollution monitoring using mobile phones. Information Policy\u00a015, 51\u201371 (2010)","journal-title":"Information Policy"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Honicky, R., Brewer, E.A., Paulos, E., White, R.: N-smarts: networked suite of mobile atmospheric real-time sensors. In: Proceedings of the 2nd ACM SIGCOMM workshop on Networked systems for developing regions (NSDR 2008), pp. 25\u201330 (2008)","DOI":"10.1145\/1397705.1397713"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Mohan, P., Padmanabhan, V.N., Ramjee, R.: Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys 2008), pp. 323\u2013336 (2008)","DOI":"10.1145\/1460412.1460450"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Das, T., Mohan, P., Padmanabhan, V.N., Ramjee, R., Sharma, A.: PRISM: platform for remote sensing using smartphones. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), San Francisco, California, USA, pp. 63\u201376 (2010)","DOI":"10.1145\/1814433.1814442"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N.: AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing (2010)","DOI":"10.1016\/j.pmcj.2010.04.001"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Krontiris, I., Albers, A.: Monetary incentives in participatory sensing using multi-attributive auctions. International Journal of Parallel, Emergent and Distributed Systems (2012)","DOI":"10.1080\/17445760.2012.686170"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S., Seada, K.: Fusing mobile, sensor, and social data to fully enable context-aware computing. In: Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (HotMobile 2010), Annapolis, Maryland, pp. 60\u201365 (2010)","DOI":"10.1145\/1734583.1734599"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Krontiris, I., Freiling, F.C.: Integrating people-centric sensing with social networks: A privacy research agenda. In: Proceeding of the IEEE International Workshop on Security and Social Networking, SESOC (2010)","DOI":"10.1109\/PERCOMW.2010.5470510"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Carbunar, B., Yu, Y., Shi, W., Pearce, M., Vasudevan, V.: Query privacy in wireless sensor networks. ACM Transactions on Sensor Networks 6(2) (2010)","DOI":"10.1145\/1689239.1689244"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhang, Y., Ren, K.: DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks. In: Proceeding of the 28th Conference on Computer Communications, INFOCOM 2009 (2009)","DOI":"10.1109\/INFCOM.2009.5062039"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., Ding, X., Tsudik, G.: Privacy-preserving querying in sensor networks. In: Proceeding of the International Conference on Computer Communications and Networks, ICCCN 2009 (2009)","DOI":"10.1109\/ICCCN.2009.5235352"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Dimitriou, T., Sabouri, A.: Privacy preservation schemes for querying wireless sensor networks. In: Proceedings of the 7th IEEE PerCom International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS 2011), pp. 178\u2013183 (2011)","DOI":"10.1109\/PERCOMW.2011.5766864"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., Soriente, C.: Short paper: PEPSI \u2013 privacy-enhanced participatory sensing infrastructure. In: Proceedings of the Fourth ACM Conference on Wireless Network Security (WiSec 2011), pp. 23\u201328 (2011)","DOI":"10.1145\/1998412.1998418"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO, pp. 199\u2013203 (1982)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/BFb0034851","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"M. Abe","year":"1996","unstructured":"Abe, M., Fujisaki, E.: How to Date Blind Signatures. In: Kim, K.-C., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 244\u2013251. Springer, Heidelberg (1996)"},{"issue":"2","key":"11_CR16","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystem. Notices of the American Mathematical Society (AMS)\u00a046(2), 203\u2013213 (1999)","journal-title":"Notices of the American Mathematical Society (AMS)"},{"issue":"3","key":"11_CR17","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology\u00a04(3), 161\u2013174 (1991)","journal-title":"Journal of Cryptology"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-48071-4_3","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"T. Okamoto","year":"1993","unstructured":"Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 31\u201353. Springer, Heidelberg (1993)"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S.: Untraceable Off-Line Cash in Wallets with Observers (Extended Abstract). In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 302\u2013318. Springer, Heidelberg (1994)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Osipkov, I., Vasserman, E.Y., Hopper, N., Kim, Y.: Combating double-spending using cooperative P2P systems. In: Proceedings of the 27th International Conference on Distributed Computing Systems, ICDCS 2007 (2007)","DOI":"10.1109\/ICDCS.2007.91"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/3-540-44598-6_14","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"J.-S. Coron","year":"2000","unstructured":"Coron, J.-S.: On the Exact Security of Full Domain Hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 229\u2013235. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33392-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T23:35:26Z","timestamp":1557185726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33392-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333910","9783642333927"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33392-7_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}