{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T21:27:07Z","timestamp":1668202027294},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T00:00:00Z","timestamp":1498608000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s00779-017-1051-z","type":"journal-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T00:05:47Z","timestamp":1498608347000},"page":"923-936","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-preserving identity-based file sharing in smart city"],"prefix":"10.1007","volume":"21","author":[{"given":"Xiling","family":"Luo","sequence":"first","affiliation":[]},{"given":"Yili","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jungang","family":"Lou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,28]]},"reference":[{"key":"1051_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/EMS.2009.112","volume-title":"3rd UKSim European symposium on computer modeling and simulation","author":"M Al-Hader","year":"2009","unstructured":"Al-Hader M, Rodzi A, Sharif AR, Ahmad N (2009) SOA of smart city geospatial management 3rd UKSim European symposium on computer modeling and simulation, pp 6\u201310. doi:\n                        10.1109\/EMS.2009.112"},{"key":"1051_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/RIOT.2015.7104906","volume-title":"International conference on recent advances in internet of things","author":"JM Bohli","year":"2015","unstructured":"Bohli JM, Skarmeta A, Victoria Moreno M, Garcia D, Langendorfer P (2015) SMARTIE project: secure IoT data management for smart cities International conference on recent advances in internet of things, pp 1\u20136. doi:\n                        10.1109\/RIOT.2015.7104906"},{"key":"1051_CR3","first-page":"13","volume-title":"CRYPTO 1998. LNCS, vol 1462","author":"R Cramer","year":"1998","unstructured":"Cramer R, Shoup V (1998) A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H (ed) CRYPTO 1998. LNCS, vol 1462. Springer, Berlin, Heidelberg, pp 13\u201325"},{"key":"1051_CR4","first-page":"179","volume-title":"ASIACRYPT 2009. LNCS, vol 5912","author":"J Cathalo","year":"2009","unstructured":"Cathalo J, Libert B, Yung M (2009) Group encryption: Noninteractive realization in the standard model. In: Matsui M (ed) ASIACRYPT 2009. LNCS, vol 5912. Springer, Berlin, Heidelberg, pp 179\u2013196"},{"key":"1051_CR5","doi-asserted-by":"publisher","first-page":"2289","DOI":"10.1109\/HICSS.2012.615","volume-title":"Hawaii international conference on system science (HICSS)","author":"H Chourabi","year":"2012","unstructured":"Chourabi H, Nam T, Walker S, Gil-Garcia JR, Mellouli S, Nahon K, Pardo TA, Scholl HJ (2012) Understanding smart cities: an integrative framework Hawaii international conference on system science (HICSS), pp 2289\u20132297. doi:\n                        10.1109\/HICSS.2012.615"},{"issue":"5","key":"1051_CR6","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","volume":"12","author":"X Chen","year":"2015","unstructured":"Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Sec Comput 12(5):546\u2013556","journal-title":"IEEE Trans Dependable Sec Comput"},{"issue":"4","key":"1051_CR7","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.jare.2014.02.006","volume":"5","author":"AS Elmaghraby","year":"2014","unstructured":"Elmaghraby AS, Losavio MM (2014) Cyber security challenges in smart cities: safety, security and privacy. J Adv Res 5(4):491\u2013497","journal-title":"J Adv Res"},{"key":"1051_CR8","first-page":"444","volume-title":"ASIACRYPT 2006. LNCS, vol 4284","author":"J Groth","year":"2006","unstructured":"Groth J (2006) Simulation-sound NIZK proofs for a practical language and constant size group signatures. In: Lai X., Chen K (eds) ASIACRYPT 2006. LNCS, vol 4284. Springer, Berlin, Heidelberg, pp 444\u2013459"},{"key":"1051_CR9","first-page":"445","volume-title":"EUROCRYPT 2006, LNCS, vol 4004","author":"C Gentry","year":"2006","unstructured":"Gentry C (2006) Practical identity-based encryption without random oracles. In: Vaudenay S (ed) EUROCRYPT 2006, LNCS, vol 4004. Springer, Berlin, Heidelberg, pp 445\u2013464"},{"issue":"4","key":"1051_CR10","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TC.2014.2315619","volume":"64","author":"X Huang","year":"2015","unstructured":"Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971\u2013983","journal-title":"IEEE Trans Comput"},{"key":"1051_CR11","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.1109\/WCNC.2005.1424899","volume-title":"Wireless communications and networking conference, vol 4","author":"T Ho\u00dffeld","year":"2005","unstructured":"Ho\u00dffeld T, Tutschku K, Andersen F U (2005) Mapping of file-sharing onto mobile environments: feasibility and performance of eDonkey with GPRS Wireless communications and networking conference, vol 4, pp 2453\u20132458. doi:\n                        10.1109\/WCNC.2005.1424899"},{"issue":"7","key":"1051_CR12","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1109\/TPDS.2010.170","volume":"22","author":"A Iamnitchi","year":"2011","unstructured":"Iamnitchi A, Ripeanu M, Santos-Neto E, Foster I (2011) The small world of file sharing. IEEE Trans Parallel Distrib Syst 22(7):1120\u20131134","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1051_CR13","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1109\/UCC.2014.131","volume-title":"International conference on utility and cloud computing","author":"Z Khan","year":"2014","unstructured":"Khan Z, Pervez Z, Ghafoor A (2014) Towards cloud based smart cities data security and privacy management International conference on utility and cloud computing, pp 806\u2013811. doi:\n                        10.1109\/UCC.2014.131"},{"key":"1051_CR14","first-page":"181","volume-title":"ASIACRYPT 2007. LNCS, vol 4833","author":"A Kiayias","year":"2007","unstructured":"Kiayias A, Tsiounis Y, Yung M (2007) Group encryption. In: Kurosawa K (ed) ASIACRYPT 2007. LNCS, vol 4833. Springer, Berlin, Heidelberg, pp 181\u2013199"},{"key":"1051_CR15","first-page":"87","volume-title":"ACISP 2016. LNCS, vol 9723","author":"X Luo","year":"2016","unstructured":"Luo X, Ren Y, Liu J, Hu J, Liu W, Wang Z, Xu W, Wu Q (2016) Identity-based group encryption. In: Liu J K, Steinfeld R (eds) ACISP 2016. LNCS, vol 9723. Springer, Berlin, Heidelberg, pp 87\u2013102"},{"key":"1051_CR16","first-page":"592","volume-title":"PKC 2014. LNCS, vol 8383","author":"B Libert","year":"2014","unstructured":"Libert B, Yung M, Joye M, Peters T (2014) Traceable group encryption. In: Krawczyk H (ed) PKC 2014. LNCS, vol 8383. Springer, Berlin, Heidelberg, pp 592\u2013610"},{"issue":"3","key":"1051_CR17","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s12083-015-0416-1","volume":"9","author":"K Lu","year":"2016","unstructured":"Lu K, Wang J, Li M (2016) An Eigentrust dynamic evolutionary model in P2P file-sharing systems. Peer-to-Peer Netw Appl 9(3):599\u2013612. doi:\n                        10.1007\/s12083-015-0416-1","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1051_CR18","first-page":"1","volume-title":"International conference on smart cities and green ICT systems","author":"A Monzon","year":"2015","unstructured":"Monzon A (2015) Smart cities concept and challenges: bases for the assessment of smart city projects International conference on smart cities and green ICT systems, pp 1\u201311"},{"key":"1051_CR19","first-page":"72","volume-title":"Inscrypt 2008. LNCS, vol 5487","author":"B Qin","year":"2009","unstructured":"Qin B, Wu Q, Susilo W, Mu Y (2009) Publicly verifiable privacy-preserving group decryption. In: Yung M, Liu P, Lin D (eds) Inscrypt 2008. LNCS, vol 5487. Springer, Berlin, Heidelberg, pp 72\u201383"},{"key":"1051_CR20","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/CSCS.2013.58","volume-title":"International conference on control systems and computer science","author":"G Suciu","year":"2013","unstructured":"Suciu G, Vulpe A, Halunga S, Fratu O, Todoran G, Suciu V (2013) Smart cities built on resilient cloud computing and secure Internet of Things International conference on control systems and computer science, pp 513\u2013518. doi:\n                        10.1109\/CSCS.2013.58"},{"key":"1051_CR21","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1109\/ICECC.2011.6066743","volume-title":"International conference on electronics, communications and control","author":"K Su","year":"2011","unstructured":"Su K, Li J, Fu H (2011) Smart city and the applications International conference on electronics, communications and control, pp 1028\u20131031. doi:\n                        10.1109\/ICECC.2011.6066743"},{"issue":"6","key":"1051_CR22","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1109\/TPDS.2009.127","volume":"21","author":"H Shen","year":"2010","unstructured":"Shen H (2010) An efficient and adaptive decentralized file replication algorithm in P2P file sharing systems. IEEE Trans Parallel Distrib Syst 21(6):827\u2013840","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"1051_CR23","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TVT.2009.2034669","volume":"59","author":"Q Wu","year":"2010","unstructured":"Wu Q, Domingo-Ferrer J, Gonz\u00e1lez-Nicol\u00e1s \u00da (2010) Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Trans Vehicular Technol 59(2):559\u2013573","journal-title":"IEEE Trans Vehicular Technol"},{"key":"1051_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/SSIC.2015.7245322","volume-title":"International conference on cyber security of smart cities, industrial control system and communications","author":"P Wang","year":"2015","unstructured":"Wang P, Ali A, Kelly W (2015) Data security and threat modeling for smart city infrastructure International conference on cyber security of smart cities, industrial control system and communications, pp 1\u20136. doi:\n                        10.1109\/SSIC.2015.7245322"},{"key":"1051_CR25","first-page":"468","volume-title":"ACISP 2005. LNCS, vol 3574","author":"VK Wei","year":"2005","unstructured":"Wei VK, Yuen TH, Zhang F (2005) Group signature where group manager, members and open authority are identity-based. In: Boyd C., Nieto JMG (eds) ACISP 2005. LNCS, vol 3574. Springer, Berlin, Heidelberg, pp 468\u2013480"},{"issue":"1","key":"1051_CR26","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Intern Things J 1(1):22\u201332","journal-title":"IEEE Intern Things J"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-017-1051-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1051-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1051-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:02:39Z","timestamp":1506999759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-017-1051-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,28]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1051"],"URL":"https:\/\/doi.org\/10.1007\/s00779-017-1051-z","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,28]]}}}