{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:45:23Z","timestamp":1773409523992,"version":"3.50.1"},"reference-count":32,"publisher":"Elsevier BV","issue":"11","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1016\/j.jss.2011.04.027","type":"journal-article","created":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T07:54:42Z","timestamp":1305964482000},"page":"1910-1927","source":"Crossref","is-referenced-by-count":22,"title":["Meetings through the cloud: Privacy-preserving scheduling on mobile devices"],"prefix":"10.1016","volume":"84","author":[{"given":"Igor","family":"Bilogrevic","sequence":"first","affiliation":[]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[]},{"given":"Praveen","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sudeep Singh","family":"Walia","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[]},{"given":"Imad","family":"Aad","sequence":"additional","affiliation":[]},{"given":"Valtteri","family":"Niemi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2011.04.027_bib0005","unstructured":"Apple iCal.http:\/\/apple.com\/ical (Last visited 27.01.2011)."},{"key":"10.1016\/j.jss.2011.04.027_bib0010","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s00145-002-0116-x","article-title":"A note on negligible functions","volume":"15","author":"Bellare","year":"2008","journal-title":"Journal of Cryptology"},{"key":"10.1016\/j.jss.2011.04.027_bib0015","doi-asserted-by":"crossref","unstructured":"Cachin, C., Strobl, R., 2004. Asynchronous group key exchange with failures. In: PODC '04: Proceedings of the Twenty-third Annual ACM Symposium on Principles of Distributed Computing, ACM, New York, NY, USA, pp. 357\u2013366.","DOI":"10.1145\/1011767.1011820"},{"key":"10.1016\/j.jss.2011.04.027_bib0020","doi-asserted-by":"crossref","unstructured":"Chen, C.H.O., Chen, C.W., Kuo, C., Lai, Y.H., McCune, J.M., Studer, A., Perrig, A., Yang, B.Y., Wu, T.C., 2008. Gangs: gather, authenticate 'n group securely. In: MobiCom '08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, ACM, New York, NY, USA, pp. 92\u2013103.","DOI":"10.1145\/1409944.1409957"},{"key":"10.1016\/j.jss.2011.04.027_bib0025","doi-asserted-by":"crossref","unstructured":"Chignell, M., Quan-Haase, A., Gwizdka, J., 2003. The privacy attitudes questionnaire (paq): initial development and validation. In: Human Factors and Ergonomics Society Annual Meeting Proceedings.","DOI":"10.1037\/e576962012-002"},{"key":"10.1016\/j.jss.2011.04.027_bib0030","unstructured":"CHIlabs PDA (Personal Digital Assistants) Use Study. http:\/\/personal.bgsu.edu\/\u223cnberg\/chilabs\/pda.htm (Last visited 27.01.2011)."},{"key":"10.1016\/j.jss.2011.04.027_bib0035","unstructured":"Dailywireless.org. http:\/\/www.dailywireless.org\/2009\/03\/24\/smartphone-users-100m-by-2013 (Last visited 27.01.2011)."},{"key":"10.1016\/j.jss.2011.04.027_bib0040","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., Tsudik, G., 2010. Practical private set intersection protocols with linear complexity. In: Financial Cryptography and Data Security FC\u201910.","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"10.1016\/j.jss.2011.04.027_bib0045","unstructured":"Doodle: Easy Scheduling. http:\/\/www.doodle.com\/ (Last visited 27.01.2011)."},{"key":"10.1016\/j.jss.2011.04.027_bib0050","doi-asserted-by":"crossref","unstructured":"Du, W., Atallah, M., 2001. Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms, ACM, New York, NY, USA, pp. 13\u201322.","DOI":"10.1145\/508172.508174"},{"key":"10.1016\/j.jss.2011.04.027_bib0055","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"ElGamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.jss.2011.04.027_bib0060","doi-asserted-by":"crossref","unstructured":"Ephrati, E., Zlotkin, G., Rosenschein, J.S., 1994. Meet your destiny: a non-manipulable meeting scheduler. In: CSCW '94: Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work, ACM, New York, NY, USA, pp. 359\u2013371.","DOI":"10.1145\/192844.193049"},{"key":"10.1016\/j.jss.2011.04.027_bib0065","doi-asserted-by":"crossref","unstructured":"Franzin, M., Freuder, E., Rossi, F., Wallace, R., 2004. Multi-agent meeting scheduling with preferences: efficiency, privacy loss, and solution quality. Computational Intelligence 20.","DOI":"10.1111\/j.0824-7935.2004.00238.x"},{"key":"10.1016\/j.jss.2011.04.027_bib0070","series-title":"Foundations of Cryptography, vol. 1","author":"Goldreich","year":"2001"},{"key":"10.1016\/j.jss.2011.04.027_bib0075","first-page":"270","article-title":"Probabilistic encryption","volume":"28","author":"Goldwasser","year":"1984","journal-title":"JCSS"},{"key":"10.1016\/j.jss.2011.04.027_bib0080","unstructured":"Google Smart Rescheduler. http:\/\/gmailblog.blogspot.com\/2010\/03\/smart-rescheduler-in-google-calendar.html (Last visited 27.01.2011)."},{"key":"10.1016\/j.jss.2011.04.027_bib0085","doi-asserted-by":"crossref","unstructured":"Herlea, T., Claessens, J., Preneel, B., Neven, G., Piessens, F., De Decker, B., 2001. On securely scheduling a meeting. In: Trusted Information: The New Decade Challenge: IFIP TC11 16th International Conference on Information Security (IFIP\/Sec\u201901), Paris, France, June 11\u201313, 2001. Kluwer Academic Pub., pp. 183\u2013198.","DOI":"10.1007\/0-306-46998-7_13"},{"key":"10.1016\/j.jss.2011.04.027_bib0090","doi-asserted-by":"crossref","unstructured":"Kellermann, B., B\u00f6hme, R., 2009. Privacy-enhanced event scheduling. In: IEEE International Conference on Computational Science and Engineering, pp. 52\u201359.","DOI":"10.1109\/CSE.2009.270"},{"key":"10.1016\/j.jss.2011.04.027_bib0095","first-page":"241","article-title":"Privacy-preserving set operations","volume":"3621","author":"Kissner","year":"2005","journal-title":"Advances in Cryptology \u2013 CRYPTO"},{"key":"10.1016\/j.jss.2011.04.027_bib0100","doi-asserted-by":"crossref","unstructured":"Lewis, J., 1995. IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction 7.","DOI":"10.1080\/10447319509526110"},{"key":"10.1016\/j.jss.2011.04.027_bib0105","doi-asserted-by":"crossref","unstructured":"Lin, Y.H., Studer, A., Hsiao, H.C., McCune, J.M., Wang, K.H., Krohn, M., Lin, P.L., Perrig, A., Sun, H.M., Yang, B.Y., 2009. Spate: small-group PKI-less authenticated trust establishment. In: MobiSys '09: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, ACM, New York, NY, USA, pp. 1\u201314.","DOI":"10.1145\/1555816.1555818"},{"key":"10.1016\/j.jss.2011.04.027_bib0110","unstructured":"Microsoft Outlook. http:\/\/office.microsoft.com\/outlook (Last visited 27.01.2011)."},{"key":"10.1016\/j.jss.2011.04.027_bib0115","unstructured":"Nokia Ovi. http:\/\/ovi.nokia.com (Last visited 27.01.2011)."},{"key":"10.1016\/j.jss.2011.04.027_bib0120","unstructured":"Nokia Qt Framework. http:\/\/qt.nokia.com\/ (Last visited 27.01.2011)."},{"key":"10.1016\/j.jss.2011.04.027_bib0125","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","article-title":"Public-key cryptosystems based on composite degree residuosity classes","volume":"1592","author":"Paillier","year":"1999","journal-title":"Advances in Cryptology \u2013 EUROCRYPT '99"},{"key":"10.1016\/j.jss.2011.04.027_bib0130","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.jss.2011.04.027_bib0135","series-title":"3rd IC on Intelligent Agent Technology","first-page":"531","article-title":"Distributed constraint satisfaction and optimization with privacy enforcement","author":"Silaghi","year":"2004"},{"key":"10.1016\/j.jss.2011.04.027_bib0140","doi-asserted-by":"crossref","unstructured":"Silaghi, M.C., 2004. Meeting scheduling guaranteeing n\/2-privacy and resistant to statistical analysis (applicable to any discsp). In: WI '04: Proceedings of the 2004 IEEE\/WIC\/ACM International Conference on Web Intelligence, IEEE Computer Society, Washington, DC, USA, pp. 711\u2013715.","DOI":"10.1109\/WI.2004.10147"},{"key":"10.1016\/j.jss.2011.04.027_bib0145","doi-asserted-by":"crossref","unstructured":"Stadler, M., 1996. Publicly verifiable secret sharing. In: Advances in Cryptology \u2013 EUROCRYPT '96, pp. 190\u2013199.","DOI":"10.1007\/3-540-68339-9_17"},{"key":"10.1016\/j.jss.2011.04.027_bib0150","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.artint.2004.10.006","article-title":"Constraint-based reasoning and privacy\/efficiency tradeoffs in multi-agent problem solving","volume":"161","author":"Wallace","year":"2005","journal-title":"Artificial Intelligence"},{"key":"10.1016\/j.jss.2011.04.027_bib0155","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.artint.2004.10.007","article-title":"Secure distributed constraint satisfaction: reaching agreement without revealing private information","volume":"161","author":"Yokoo","year":"2005","journal-title":"Artificial Intelligence"},{"key":"10.1016\/j.jss.2011.04.027_bib0160","doi-asserted-by":"crossref","first-page":"7011","DOI":"10.1016\/j.eswa.2008.08.024","article-title":"Chronos: a multi-agent system for distributed automatic meeting scheduling","volume":"36","author":"Zunino","year":"2009","journal-title":"Expert Systems with Applications"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121211001026?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121211001026?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T18:41:51Z","timestamp":1741200111000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121211001026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":32,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["S0164121211001026"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2011.04.027","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2011,11]]}}}