{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T20:58:35Z","timestamp":1757537915775,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557460"},{"type":"electronic","value":"9789811557477"}],"license":[{"start":{"date-parts":[[2020,7,23]],"date-time":"2020-07-23T00:00:00Z","timestamp":1595462400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,23]],"date-time":"2020-07-23T00:00:00Z","timestamp":1595462400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5747-7_2","type":"book-chapter","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T18:03:59Z","timestamp":1595441039000},"page":"17-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of a Centralized Location-Sharing Scheme for Mobile Online Social Networks"],"prefix":"10.1007","author":[{"given":"Munmun","family":"Bhattacharya","sequence":"first","affiliation":[]},{"given":"Sandip","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Soumya","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,23]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.future.2017.01.035","volume":"86","author":"X Xiao","year":"2018","unstructured":"Xiao, X., Chen, C., Sangaiah, A.K., Huc, G., Ye, R., Jiang, Y.: A centralized privacy-preserving location-sharing system for mobile online social networks. Future Generation Computer Systems 86(1), 863\u2013872 (2018)","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.future.2016.05.005","volume":"78","author":"R Jiang","year":"2018","unstructured":"Jiang, R., Lu, R., Choo, K.: Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Generation Computer Systems 78(1), 392\u2013401 (2018)","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"2_CR3","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1080\/15536548.2015.1045372","volume":"11","author":"X Ju","year":"2015","unstructured":"Ju, X., Shin, K.: Location privacy protection for smartphone users using quadtree entropy maps. Journal of Information Privacy and Security 11(2), 62\u201379 (2015)","journal-title":"Journal of Information Privacy and Security"},{"issue":"5","key":"2_CR4","first-page":"1","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. IEEE Security and Privacy Magazine 10(5), 1\u201314 (2002)","journal-title":"IEEE Security and Privacy Magazine"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Ouyang Y., Le Z., Xu Y., Triandopoulos N., ZhangS., Ford J., MakeDon F., Providing Anonymity in Wireless Sensor Networks, in: IEEE International Conference on Pervasive Services, ICPS, pp. 145-148 (2007)","DOI":"10.1109\/PERSER.2007.4283904"},{"key":"2_CR6","unstructured":"Chen Z., Hu X., Ju X., Ju X., Shin K., LISA: Location information scrambler for privacy protection on smartphone, in: IEEE Communications and Network Security, CNS, pp. 296-304 (2013)"},{"key":"2_CR7","unstructured":"Rass S., Wigoutschnigg R., Schartner P., Doubly-anonymous crowds: Using secret-sharing to achieve sender-and receiver-anonymity, J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl., 2(4), 27-41 (2011)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Cox, L.P., Dalton, A., Marupadi, V.: Smokescreen: Flexible privacy controls for presence-sharing, ACM Proceedings of the 5th International Conference on Mobile Systems, pp. 233\u2013245. Applications and Services, ACM (2007)","DOI":"10.1145\/1247660.1247688"},{"key":"2_CR9","unstructured":"Wei W., Xu F., Li Q., MobiShare: Flexible privacy-preserving location sharing in mobile online social networks, IEEE INFOCOM, pp. 2616-2620, (2012)"},{"key":"2_CR10","unstructured":"Li J. W., Li J., Chen X. F., Liu Z. L., Jia C. F., MobiShare+: Security improved system for location sharing in mobile online social networks. Journal of Internet Services Information Security, (JISIS), 4(1), 25-36 (2014)"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.csi.2015.06.001","volume":"44","author":"N Shen","year":"2016","unstructured":"Shen, N., Yang, J., Yuan, K., Fu, C., Jia, C.: An efficient and privacy-preserving location sharing mechanism. Computer Standards & Interfaces 44(1), 102\u2013109 (2016)","journal-title":"Computer Standards & Interfaces"},{"issue":"2","key":"2_CR12","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1080\/00207160.2014.917179","volume":"93","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Luo, D., Li, J., Jin, L., Chen, X., Jia, C.: N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. International Journal of Computer Mathematics 93(2), 384\u2013400 (2016)","journal-title":"International Journal of Computer Mathematics"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Roy S., Chatterjee S., Das A. K., Chattopadhyay S., Kumari S., Jo. M., Chaotic Map-based Anonymous User Authentication Scheme with User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things, IEEE Internet of Things Journal, 5(4), 2884-2895, (2018)","DOI":"10.1109\/JIOT.2017.2714179"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Roy S., Chatterjee S., Das A. K., Chattopadhyay S., Kumar, Vasilakos A. V., On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services, IEEE Access, 5(1), 25808-25825, (2017)","DOI":"10.1109\/ACCESS.2017.2764913"},{"key":"2_CR16","unstructured":"Abadi M., Blanchet B., and Comon-Lundh H., Models and Proofs of Protocol Security: A Progress Report. In 21st International Conference on Computer Aided Verification (CAV\u201909), pp. 35-49, Grenoble, France, (2009)"},{"key":"2_CR17","unstructured":"AVISPA, \u201cAutomated Validation of Internet Security Protocols and Applications,\u201d \nhttp:\/\/www.avispa-project.org\/\n\n. Accessed on November 2019"},{"key":"2_CR18","unstructured":"von Oheimb, D.: The high-level protocol specification language hlpsl developed in the eu project avispa, in Proceedings of 3rd APPSEM II Workshop on Applied Semantics (APPSEM 2005), pp. 1\u201317. Frauenchiemsee, Germany (2005)"},{"key":"2_CR19","unstructured":"Basin D., Modersheim S., Vigano L., OFMC: A symbolic model checker for security protocols International Journal of Information Security, 4(3), 181-208, (2005)"},{"key":"2_CR20","unstructured":"AVISPA, SPAN, the Security Protocol ANimator for AVISPA, \nhttp:\/\/www.avispa-project.org\/\n\n. Accessed on November 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5747-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T18:04:10Z","timestamp":1595441050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5747-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,23]]},"ISBN":["9789811557460","9789811557477"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5747-7_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,7,23]]},"assertion":[{"value":"23 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}