{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T11:08:08Z","timestamp":1772881688155,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T00:00:00Z","timestamp":1581292800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11432-019-1508-6","type":"journal-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T08:02:31Z","timestamp":1582704151000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["PPLS: a privacy-preserving location-sharing scheme in mobile online social networks"],"prefix":"10.1007","volume":"63","author":[{"given":"Chang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xuan","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Kashif","family":"Sharif","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,10]]},"reference":[{"key":"1508_CR1","first-page":"14156","volume":"38","author":"J Chen","year":"2011","unstructured":"Chen J, Wu G, Shen L, et al. Differentiated security levels for personal identifiable information in identity management system. Expert Syst Appl, 2011, 38: 14156\u201314162","journal-title":"Expert Syst Appl"},{"key":"1508_CR2","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1002\/wcm.1203","volume":"13","author":"H T Dinh","year":"2013","unstructured":"Dinh H T, Lee C, Niyato D, et al. A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput, 2013, 13: 1587\u20131611","journal-title":"Wirel Commun Mob Comput"},{"key":"1508_CR3","first-page":"702","volume-title":"Proceedings of International Conference on Human-Computer Interaction, Zurich","author":"L Barkhuus","year":"2003","unstructured":"Barkhuus L, Dey A K. Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: Proceedings of International Conference on Human-Computer Interaction, Zurich, 2003. 702\u2013712"},{"key":"1508_CR4","first-page":"2616","volume-title":"Proceedings of IEEE INFOCOM","author":"W Wei","year":"2012","unstructured":"Wei W, Xu F Y, Li Q. Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: Proceedings of IEEE INFOCOM, 2012. 2616\u20132620"},{"key":"1508_CR5","first-page":"214","volume-title":"Proceedings of the 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Compiegne","author":"Z L Liu","year":"2013","unstructured":"Liu Z L, Li J, Chen X F, et al. New privacy-preserving location sharing system for mobile online social networks. In: Proceedings of the 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Compiegne, 2013. 214\u2013218"},{"key":"1508_CR6","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1080\/00207160.2014.917179","volume":"93","author":"Z L Liu","year":"2016","unstructured":"Liu Z L, Luo D J, Li J, et al. N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int J Comput Math, 2016, 93: 384\u2013400","journal-title":"Int J Comput Math"},{"key":"1508_CR7","first-page":"25","volume":"4","author":"J W Li","year":"2014","unstructured":"Li J W, Li J, Chen X F, et al. {MobiShare}+: security improved system for location sharing in mobile online social networks. J Internet Serv Inf Secur, 2014, 4: 25\u201336","journal-title":"J Internet Serv Inf Secur"},{"key":"1508_CR8","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.csi.2015.06.001","volume":"44","author":"N Shen","year":"2016","unstructured":"Shen N, Yang J, Yuan K, et al. An efficient and privacy-preserving location sharing mechanism. Comput Standards Interfaces, 2016, 44: 102\u2013109","journal-title":"Comput Standards Interfaces"},{"key":"1508_CR9","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/JSYST.2015.2415835","volume":"11","author":"J Li","year":"2017","unstructured":"Li J, Yan H Y, Liu Z L, et al. Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Syst J, 2017, 11: 439\u2013448","journal-title":"IEEE Syst J"},{"key":"1508_CR10","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.future.2017.01.035","volume":"86","author":"X Xiao","year":"2018","unstructured":"Xiao X, Chen C, Sangaiah A K, et al. CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Generation Comput Syst, 2018, 86: 863\u2013872","journal-title":"Future Generation Comput Syst"},{"key":"1508_CR11","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y Xiao","year":"2007","unstructured":"Xiao Y, Rayi V K, Sun B, et al. A survey of key management schemes in wireless sensor networks. Comput Commun, 2007, 30: 2314\u20132341","journal-title":"Comput Commun"},{"key":"1508_CR12","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X J Du","year":"2007","unstructured":"Du X J, Xiao Y, Guizani M, et al. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw, 2007, 5: 24\u201334","journal-title":"Ad Hoc Netw"},{"key":"1508_CR13","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","author":"X J Du","year":"2009","unstructured":"Du X J, Guizani M, Xiao Y, et al. Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans Wirel Commun, 2009, 8: 1223\u20131229","journal-title":"IEEE Trans Wirel Commun"},{"key":"1508_CR14","first-page":"1","volume-title":"Proceedings of IEEE International Conference on Communications, Kyoto","author":"F Kandah","year":"2011","unstructured":"Kandah F, Zhang W Y, Du X J, et al. A secure key management scheme in wireless mesh networks. In: Proceedings of IEEE International Conference on Communications, Kyoto, 2011. 1\u20135"},{"key":"1508_CR15","first-page":"416","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptology and Information Security","author":"H Lipmaa","year":"2003","unstructured":"Lipmaa H. Verifiable homomorphic oblivious transfer and private equality test. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2003. 416\u2013433"},{"key":"1508_CR16","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/11889663_5","volume-title":"Proceedings of International Conference on Financial Cryptography and Data Security","author":"P Golle","year":"2006","unstructured":"Golle P. A private stable matching algorithm. In: Proceedings of International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2006. 65\u201380"},{"key":"1508_CR17","first-page":"399","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Saragossa","author":"M Bellare","year":"1996","unstructured":"Bellare M, Rogaway P. The exact security of digital signatures - how to sign with RSA and rabin. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, 1996. 399\u2013416"},{"key":"1508_CR18","doi-asserted-by":"publisher","first-page":"039106","DOI":"10.1007\/s11432-018-9483-x","volume":"62","author":"C L Yan","year":"2018","unstructured":"Yan C L, Ni Z Y, Cao B, et al. UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks. Sci China Inf Sci, 2018, 62: 039106","journal-title":"Sci China Inf Sci"},{"key":"1508_CR19","first-page":"62","volume":"11","author":"X S Ju","year":"2015","unstructured":"Ju X, Shin K G. Location privacy protection for smartphone users using quadtree entropy maps. J Inf Priv Secur, 2015, 11: 62\u201379","journal-title":"J Inf Priv Secur"},{"key":"1508_CR20","first-page":"272","volume-title":"Proceedings of International Conference on Advanced Computing & Communication Technologies (ACCT)","author":"U P Rao","year":"2015","unstructured":"Rao U P, Girme H. A novel framework for privacy preserving in location based services. In: Proceedings of International Conference on Advanced Computing & Communication Technologies (ACCT), 2015. 272\u2013277"},{"key":"1508_CR21","doi-asserted-by":"publisher","first-page":"e2933","DOI":"10.1002\/dac.2933","volume":"30","author":"A K Das","year":"2017","unstructured":"Das A K. A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst, 2017, 30: e2933","journal-title":"Int J Commun Syst"},{"key":"1508_CR22","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L. k-anonymity: a model for protecting privacy. Int J Unc Fuzz Knowl Based Syst, 2002, 10: 557\u2013570","journal-title":"Int J Unc Fuzz Knowl Based Syst"},{"key":"1508_CR23","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, San Francisco","author":"M Gruteser","year":"2003","unstructured":"Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, San Francisco, 2003. 31\u201342"},{"key":"1508_CR24","first-page":"1248","volume-title":"Proceedings of the 21st International Conference on Data Engineering Workshops, Tokyo","author":"H Kido","year":"2005","unstructured":"Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services. In: Proceedings of the 21st International Conference on Data Engineering Workshops, Tokyo, 2005. 1248"},{"key":"1508_CR25","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-73540-3_14","volume-title":"Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases, Boston","author":"A Khoshgozaran","year":"2007","unstructured":"Khoshgozaran A, Shahabi C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases, Boston, 2007. 239\u2013257"},{"key":"1508_CR26","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1145\/1247660.1247688","volume-title":"Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan","author":"L P Cox","year":"2007","unstructured":"Cox L P, Dalton A, Marupadi V. Smokescreen: flexible privacy controls for presence-sharing. In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, 2007. 233\u2013245"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-1508-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-019-1508-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-1508-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T17:17:20Z","timestamp":1695835040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-019-1508-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,10]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["1508"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-1508-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,10]]},"assertion":[{"value":"4 April 2009","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"132105"}}