{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:35:24Z","timestamp":1775914524803,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,2,8]],"date-time":"2015-02-08T00:00:00Z","timestamp":1423353600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s12083-015-0329-z","type":"journal-article","created":{"date-parts":[[2015,2,7]],"date-time":"2015-02-07T00:17:07Z","timestamp":1423268227000},"page":"762-773","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Practical blacklist-based anonymous authentication scheme for mobile crowd sensing"],"prefix":"10.1007","volume":"9","author":[{"given":"Hongwei","family":"Li","sequence":"first","affiliation":[]},{"given":"Kun","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Haomiao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Dongxiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,8]]},"reference":[{"issue":"11","key":"329_CR1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCOM.2011.6069707","volume":"49","author":"RK Ganti","year":"2011","unstructured":"Ganti RK, Ye F, Lei H (2011) Mobile crowdsensing: current state and future challenges. IEEE Commun Mag 49(11):32\u201339","journal-title":"IEEE Commun Mag"},{"key":"329_CR2","doi-asserted-by":"crossref","unstructured":"Cheung M, Hou F, Huang J (2014) Participation and reporting in participatory sensing, the 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp 357\u2013364","DOI":"10.1109\/WIOPT.2014.6850320"},{"key":"329_CR3","doi-asserted-by":"crossref","unstructured":"Honicky R, Brewer E A, Paulos E, White R (2008) N-smarts: networked suite of mobile atmospheric real-time sensors. In: Proceedings of the second ACM SIGCOMM workshop on Networked systems for developing regions, pp 25\u201330","DOI":"10.1145\/1397705.1397713"},{"key":"329_CR4","doi-asserted-by":"crossref","unstructured":"Mohan P, Padmanabhan VN, Ramjee R (2008) Nericell: rich monitoring of road and traffic conditions using mobile smartphones. In: Proceedings of the 6th ACM conference on Embedded network sensor systems, pp 323\u2013336","DOI":"10.1145\/1460412.1460444"},{"key":"329_CR5","doi-asserted-by":"crossref","unstructured":"Talasila M, Curtmola R, Borcea C (2013) Improving location reliability in crowd sensed data with minimal efforts. In: the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, pp 1\u20138","DOI":"10.1109\/WMNC.2013.6549016"},{"key":"329_CR6","doi-asserted-by":"crossref","unstructured":"Liu D, Li H, Yang Y, Yang H (2014) Achieving multi-authority access control with efficient attribute revocation in smart grid. In: IEEE International Conference on Communications (ICC). IEEE, pp 634\u2013639","DOI":"10.1109\/ICC.2014.6883390"},{"key":"329_CR7","doi-asserted-by":"crossref","unstructured":"Froehlich J, Dillahunt T, Klasnja P, Mankoff J, Consolvo S, Harrison B, Landay JA (2009) Ubigreen: investigating a mobile tool for tracking and supporting green transportation habits. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, pp 1043\u20131052","DOI":"10.1145\/1518701.1518861"},{"issue":"10","key":"329_CR8","first-page":"2606","volume":"97","author":"D Mianxiong","year":"2014","unstructured":"Mianxiong D, Kimata T, Sugiura K, Zettsu K (2014) Quality-of-experience (qoe) in emerging mobile social networks. IEICE Trans Inf Syst 97(10):2606\u20132612","journal-title":"IEICE Trans Inf Syst"},{"key":"329_CR9","unstructured":"Ota K, Dong M, Zhu H, Chang S, Shen X (2011) Traffic information prediction in urban vehicular networks: A correlation based approach IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1021\u20131025"},{"key":"329_CR10","first-page":"8","volume":"11","author":"H Li","year":"2014","unstructured":"Li H, Yang Y, Wen M, Luo H, Lu R (2014) Emrq: An efficient multi-keyword range query scheme in smart grid auction market. KSII Trans Internet Inf Syst 11:8","journal-title":"KSII Trans Internet Inf Syst"},{"key":"329_CR11","doi-asserted-by":"crossref","unstructured":"Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. In: IEEE International Conference on Communications (ICC). IEEE, pp 951\u2013956","DOI":"10.1109\/ICC.2014.6883442"},{"issue":"8","key":"329_CR12","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","volume":"25","author":"H Li","year":"2014","unstructured":"Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2014) EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid. IEEE Trans Parallel Distrib Syst 25(8):2053\u20132064","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"329_CR13","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/JSYST.2013.2271537","volume":"8","author":"H Li","year":"2014","unstructured":"Li H, Lu R, Zhou L, Yang B, Shen X (2014) An Efficient Merkle Tree Based Authentication Scheme for Smart Grid. IEEE Syst J 8(2):655\u2013663","journal-title":"IEEE Syst J"},{"key":"329_CR14","doi-asserted-by":"crossref","unstructured":"Li H, Dai Y, Tian L, Yang H (2009) Identity-based authentication for cloud computing. In: Cloud computing. Springer, pp 157\u2013166","DOI":"10.1007\/978-3-642-10665-1_14"},{"key":"329_CR15","doi-asserted-by":"crossref","unstructured":"Reddy S, Parker A, Hyman J, Burke J, Estrin D, Hansen M (2007) Image browsing, processing, and clustering for participatory sensing: lessons from a dietsense prototype. In: Proceedings of the 4th workshop on Embedded networked sensors. ACM, pp 13\u201317","DOI":"10.1145\/1278972.1278975"},{"key":"329_CR16","doi-asserted-by":"crossref","unstructured":"Ota K, Dong M, Chang S, Zhu H (2014) Mmcd: Max-throughput and min-delay cooperative downloading for drive-thru internet systems. In: IEEE International Conference on Communications (ICC). IEEE, pp 83\u201387","DOI":"10.1109\/ICC.2014.6883299"},{"key":"329_CR17","doi-asserted-by":"crossref","unstructured":"Yang C, Ma W, Wang X (2007) Novel remote user authentication scheme using bilinear pairings. In: Autonomic and Trusted Computing. Springer, pp 306\u2013312","DOI":"10.1007\/978-3-540-73547-2_32"},{"key":"329_CR18","volume-title":"Proceedings of GLOBECOM","author":"Y Yang","year":"2014","unstructured":"Yang Y, Li H, Liu W, Yang H, Wen M (2014) Secure Dynamic Searchable Symmetric Encryption with Constant Document Update Cost. In: Proceedings of GLOBECOM. to appear. Anaheim, California, USA"},{"issue":"3","key":"329_CR19","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"J-H Yang","year":"2009","unstructured":"Yang J-H, Chang C-C (2009) An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28(3):138\u2013143","journal-title":"Comput Secur"},{"key":"329_CR20","doi-asserted-by":"crossref","unstructured":"Tseng Y-M, Wu T-Y, Wu J-D (2007) A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. In: The 31st Annual International Computer Software and Applications Conference. IEEE, pp 700\u2013710","DOI":"10.1109\/COMPSAC.2007.32"},{"key":"329_CR21","doi-asserted-by":"crossref","unstructured":"Li H, Liu D, Dai Y, Luan T, Shen X Enabling Efficient Multi-keyword Ranked Search over Encrypted Cloud Data through Blind Storage. In: IEEE Transactions on Emerging Topics in Computing. doi: 10.1109\/TETC.2014.2371239","DOI":"10.1109\/TETC.2014.2371239"},{"issue":"3","key":"329_CR22","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/TWC.2012.12.112120","volume":"12","author":"J Ren","year":"2013","unstructured":"Ren J, Harn L (2013) An efficient threshold anonymous authentication scheme for privacy-preserving communications. IEEE Trans Wirel Commun 12(3):1018\u20131025","journal-title":"IEEE Trans Wirel Commun"},{"key":"329_CR23","doi-asserted-by":"crossref","unstructured":"Lin Z, Hopper N (2010) Jack: Scalable accumulator-based nymble system. In: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, pp 53\u201362","DOI":"10.1145\/1866919.1866927"},{"issue":"2","key":"329_CR24","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/TDSC.2009.38","volume":"8","author":"PP Tsang","year":"2011","unstructured":"Tsang PP, Kapadia A, Cornelius C, Smith SW (2011) Nymble: Blocking misbehaving users in anonymizing networks. IEEE Trans Dependable Secure Comput 8(2):256\u2013269","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"329_CR25","doi-asserted-by":"crossref","unstructured":"Tsang PP, Au MH, Kapadia A, Smith SW (2007) Blacklistable anonymous credentials: blocking misbehaving users without ttps. In: Proceedings of the 14th ACM conference on Computer and communications security, pp 72\u201381","DOI":"10.1145\/1315245.1315256"},{"issue":"4","key":"329_CR26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1880022.1880033","volume":"13","author":"PP Tsang","year":"2010","unstructured":"Tsang PP, Au MH, Smith SW, Kapadia A (2010) Blac: Revoking repeatedly misbehaving anonymous users without relying on ttps. ACM Trans Inf Syst Secur (TISSEC) 13(4):39","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"issue":"7","key":"329_CR27","doi-asserted-by":"crossref","first-page":"3508","DOI":"10.1109\/TVT.2009.2012389","volume":"58","author":"X Cao","year":"2009","unstructured":"Cao X, Zeng X, Kou W, Hu L (2009) Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans Veh Technol 58(7):3508\u20133517","journal-title":"IEEE Trans Veh Technol"},{"key":"329_CR28","doi-asserted-by":"crossref","unstructured":"Liu J, Zhang Z, Chen X, Kwak K (2014) Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans Parallel Distrib Syst:332\u2013342","DOI":"10.1109\/TPDS.2013.145"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0329-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-015-0329-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0329-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T14:33:55Z","timestamp":1566311635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-015-0329-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,8]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["329"],"URL":"https:\/\/doi.org\/10.1007\/s12083-015-0329-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,8]]}}}