{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:14Z","timestamp":1740122654155,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,10,17]],"date-time":"2016-10-17T00:00:00Z","timestamp":1476662400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11277-016-3823-6","type":"journal-article","created":{"date-parts":[[2016,10,17]],"date-time":"2016-10-17T09:51:36Z","timestamp":1476697896000},"page":"1171-1187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Priority-Aware Interests Similarity Protocol (PAISP) for Proximity Based Mobile Social Network"],"prefix":"10.1007","volume":"95","author":[{"given":"Fizza","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Ubaidullah","family":"Rajput","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2989-8737","authenticated-orcid":false,"given":"Heekuck","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,17]]},"reference":[{"key":"3823_CR1","doi-asserted-by":"crossref","unstructured":"Abbas, F., Hussain, R., Son, J., & Oh, H. (2013). Privacy preserving cloud-based computing platform (PPCCP) for using location based services. In IEEE\/ACM 6th international conference on utility and cloud computing (UCC) (pp. 60\u201366).","DOI":"10.1109\/UCC.2013.26"},{"key":"3823_CR2","doi-asserted-by":"crossref","unstructured":"Kayastha, N., Niyato, D., Wang, P., & Hossain, E. (2011). Applications, architectures, and protocol design issues for mobile social networks: A survey. In Proceedings of the IEEE (Vol. 99, pp. 2130\u20132158).","DOI":"10.1109\/JPROC.2011.2169033"},{"issue":"99","key":"3823_CR3","first-page":"1","volume":"PP","author":"Y Najaflou","year":"2013","unstructured":"Najaflou, Y., Jedari, B., Xia, F., Yang, L. T., & Obaidat, M. S. (2013). Safety challenges and solutions in mobile social networks. IEEE System Journal, 9, 1\u201321.","journal-title":"IEEE System Journal"},{"issue":"2","key":"3823_CR4","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MPRV.2005.37","volume":"4","author":"N Eagle","year":"2005","unstructured":"Eagle, N., & Pentland, A. (2005). Social serendipity: Mobilizing social software. IEEE Pervasive Computing, 4(2), 28\u201334.","journal-title":"IEEE Pervasive Computing"},{"key":"3823_CR5","doi-asserted-by":"crossref","unstructured":"Cox, L. P., Dalton, A., & Marupadi, V. (2007). SmokeScreen: Flexible privacy controls for presence-sharing. In 6th ACM international conference on mobile systems, applications and services (MobiSys) (pp. 233\u2013245).","DOI":"10.1145\/1247660.1247688"},{"key":"3823_CR6","doi-asserted-by":"crossref","unstructured":"Li, M., Cao, N., Yu, S., & Lou, W. (2011). Findu: Privacy-preserving personal profile matching in mobile social networks. In IEEE INFOCOM (pp. 2435\u20132443).","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"3823_CR7","doi-asserted-by":"crossref","unstructured":"Abbas, F., Rajput, U., Wang, J., Eun, H., & Oh, H. (2016). Say hello again: Privacy preserving matchmaking using cloud in encounter based mobile social networks. In 16th IEEE\/ACM international symposium on cluster, cloud and grid computing (CCGrid) (pp. 453\u2013457).","DOI":"10.1109\/CCGrid.2016.39"},{"issue":"5","key":"3823_CR8","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MTS.2012.2225674","volume":"3","author":"X Chen","year":"2012","unstructured":"Chen, X., & Michael, K. (2012). Privacy issues and solutions in social network sites. IEEE Technology and Society Magazine, 3(5), 43\u201353.","journal-title":"IEEE Technology and Society Magazine"},{"key":"3823_CR9","doi-asserted-by":"crossref","unstructured":"Freedman, M. J., Nissim, K., & Pinkas, B. (2004). Efficient private matching and set intersection. In Advances in cryptology-EUROCRYPT (pp. 1\u201319). Berlin: Springer.","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"3823_CR10","unstructured":"Lea, K., & Song, D. (2005). Privacy-preserving set operations. In Advances in cryptology-CRYPTO (pp. 241\u2013257). Berlin: Springer."},{"key":"3823_CR11","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Evfimievski, A., & Srikant, R. (2003). Information sharing across private databases. In International conference on management of data (ACM SIGMOD) (pp. 86\u201397).","DOI":"10.1145\/872757.872771"},{"key":"3823_CR12","unstructured":"Xie, Q., & Hengartner, U. (2011). Privacy-preserving matchmaking for mobile social networking secure against malicious users. In 9th IEEE international conference on trust, security and privacy in computing and communications (pp. 252\u2013259)."},{"key":"3823_CR13","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhang, T., Li, H., He, L., & Peng, J. (2012). Efficient privacy preserving matchmaking for mobile social networking against malicious users. In 11th IEEE international conference on trust, security and privacy in computing and communications (pp. 610\u2013615).","DOI":"10.1109\/TrustCom.2012.142"},{"key":"3823_CR14","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/ACCESS.2016.2564985","volume":"4","author":"F Abbas","year":"2016","unstructured":"Abbas, F., Rajput, U., & Oh, H. (2016). PRISM: Privacy-aware interest sharing and matching in mobile social networks. IEEE Access, 4, 2594\u20132603.","journal-title":"IEEE Access"},{"issue":"9","key":"3823_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSAC.2013.SUP.0513000","volume":"31","author":"X Liang","year":"2013","unstructured":"Liang, X., Li, X., Zhang, K., Lu, R., Lin, X., & Shen, X. (2013). Fully anonymous profile matching in mobile social networks. Journal of Selected Areas in communication, 31(9), 1\u201315.","journal-title":"Journal of Selected Areas in communication"},{"key":"3823_CR16","doi-asserted-by":"crossref","unstructured":"Paillier, P., & Pointcheval, D. (1999). Efficient public-key cryptosystems provably secure against active adversaries. In Advances in cryptology-ASIACRYPT (pp. 165\u2013179). Berlin: Springer.","DOI":"10.1007\/978-3-540-48000-6_14"},{"key":"3823_CR17","doi-asserted-by":"crossref","unstructured":"Dong, W., Dave, V., Qiu, L., & Zhang, Y. (2011). Secure friend discovery in mobile social networks. In IEEE INFOCOM (pp. 1647\u20131655).","DOI":"10.1109\/INFCOM.2011.5934958"},{"key":"3823_CR18","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1109\/JSAC.2013.SUP.0513057","volume":"31","author":"R Zhang","year":"2013","unstructured":"Zhang, R., Zhang, Y., Sun, J., & Yan, G. (2013). Privacy preservation for proximity based mobile social networking. IEEE Journal of Selected Areas in Communications, 31, 656\u2013668.","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"3823_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhang, Y., Sun, J., & Yan, G. (2012). Fine-grained private matching for proximity-based mobile social networking. In IEEE INFOCOM (pp. 1969\u20131977).","DOI":"10.1109\/INFCOM.2012.6195574"},{"key":"3823_CR20","doi-asserted-by":"crossref","unstructured":"Niu, B., Zhu, X., Zhang, T., & Chi, H. (2013). P-match: Priority-aware friend discovery for proximity-based mobile social networks. In IEEE 10th international conference mobile ad-hoc and sensor systems (MASS) (pp. 351\u2013355).","DOI":"10.1109\/MASS.2013.70"},{"issue":"1","key":"3823_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/2192-113X-1-1","volume":"1","author":"A Basu","year":"2012","unstructured":"Basu, A., Vaidya, J., Kikuchi, H., Dimitrakos, T., & Nair, S. K. (2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing, 1(1), 1\u201314.","journal-title":"Journal of Cloud Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3823-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3823-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3823-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T11:02:16Z","timestamp":1502190136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3823-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,17]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["3823"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3823-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2016,10,17]]}}}