{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T13:06:59Z","timestamp":1755695219402,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819709410"},{"type":"electronic","value":"9789819709427"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0942-7_17","type":"book-chapter","created":{"date-parts":[[2024,2,25]],"date-time":"2024-02-25T20:02:00Z","timestamp":1708891320000},"page":"343-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggregate Query"],"prefix":"10.1007","author":[{"given":"Yuxi","family":"Li","sequence":"first","affiliation":[]},{"given":"Fucai","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zifeng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,26]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Liu, Y., Kong, L., Chen, G.: Data-oriented mobile crowdsensing: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(3), 2849\u20132885 (2019a)","DOI":"10.1109\/COMST.2019.2910855"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"[Kucuk, K., Bayilmis, C., Sonmez, A.F., Kacar, S.: Crowd sensing aware disaster framework design with IoT technologies. J. Ambient Intell. Humaniz. Comput. 11, 1709\u20131725 (2020)","DOI":"10.1007\/s12652-019-01384-1"},{"issue":"10","key":"17_CR3","doi-asserted-by":"publisher","first-page":"6940","DOI":"10.1109\/TWC.2017.2734758","volume":"16","author":"X Wang","year":"2017","unstructured":"Wang, X., Liu, Z., Tian, X., Gan, X., Guan, Y., Wang, X.: Incentivizing crowdsensing with location-privacy preserving. IEEE Trans. Wireless Commun. 16(10), 6940\u20136952 (2017)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"4","key":"17_CR4","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TMC.2019.2901463","volume":"19","author":"V Sucasas","year":"2019","unstructured":"Sucasas, V., Mantas, G., Bastos, J., et al.: A signature scheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing[J]. IEEE Trans. Mob. Comput. 19(4), 752\u2013768 (2019)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"10","key":"17_CR5","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/LCOMM.2020.3003997","volume":"24","author":"X Niu","year":"2020","unstructured":"Niu, X., Huang, H., Li, Y.: A real-time data collection mechanism with trajectory privacy in mobile crowdsensing. IEEE Commun. Lett. 24(10), 2114\u20132118 (2020)","journal-title":"IEEE Commun. Lett."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Yang, Q., Chen, Y., Guizani, M., Lee, G.M.: Spatiotemporal location differential privacy for sparse mobile crowdsensing. In: Proceedings of the International Wireless Communications and Mobile Computing, Harbin City, China (2021)","DOI":"10.1109\/IWCMC51323.2021.9498951"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Gao, J., Fu, S., Luo, Y., et al.: Location privacy-preserving truth discovery in mobile crowd sensing. In: 2020 29th International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20139. IEEE (2020)","DOI":"10.1109\/ICCCN49398.2020.9209742"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Arivarasi, A., Ramesh, P.: An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN. J. Ambient Intell. Humanized Comput. 1\u201313 (2021). https:\/\/doi.org\/10.1007\/s12652-021-03021-2","DOI":"10.1007\/s12652-021-03021-2"},{"issue":"12","key":"17_CR9","doi-asserted-by":"publisher","first-page":"4410","DOI":"10.1109\/TMC.2021.3080714","volume":"21","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Zhu, L., Xu, C., et al.: Location privacy-preserving task recommendation with geometric range query in mobile crowdsensing. IEEE Trans. Mob. Comput. 21(12), 4410\u20134425 (2021)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"17_CR10","unstructured":"Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing: improvements and extensions. Cryptology ePrint Archive (2018)"},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM (JACM) 33(4), 792\u2013807 (1986)","journal-title":"J. ACM (JACM)"},{"key":"17_CR12","unstructured":"Geohash. https:\/\/en.wikipedia.org\/wiki\/Geohash"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Moussalli, R., Srivatsa, M., Asaad, S.: Fast and flexible conversion of geohash codes to and from latitude\/longitude coordinates. In: 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines, IEEE (2015)","DOI":"10.1109\/FCCM.2015.18"},{"issue":"16","key":"17_CR14","doi-asserted-by":"publisher","first-page":"14803","DOI":"10.1109\/JIOT.2021.3084937","volume":"9","author":"S Zou","year":"2021","unstructured":"Zou, S., Xi, J., Xu, G., Zhang, M., Lu, Y.: CrowdHB: a decentralized location privacy-preserving crowdsensing system based on a hybrid blockchain network. IEEE Internet Things J. 9(16), 14803\u201314817 (2021)","journal-title":"IEEE Internet Things J."},{"key":"17_CR15","unstructured":"Reichert, L., Brack, S., Scheuermann, B.: Privacy-preserving contact tracing of COVID-19 patients. Cryptology ePrint Archive (2020)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Ran, C.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp. 136\u2013145. IEEE (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"17_CR17","unstructured":"The OpenSSL Project. OpenSSL: The Open Source Toolkit for SSL\/TLS. (2015). http:\/\/www.openssl.org\/. Accessed May 2023"},{"key":"17_CR18","unstructured":"Gowalla (2021). https:\/\/snap.stanford.edu\/data\/loc-gowalla.html. Accessed 13 Mar 2023"},{"key":"17_CR19","unstructured":"libgeohash. https:\/\/github.com\/simplegeo\/libgeohash"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0942-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T11:28:39Z","timestamp":1749036519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0942-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819709410","9789819709427"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0942-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"26 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/link.springer.com\/conference\/cisc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"152","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}