{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:05:07Z","timestamp":1762376707994,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["4162020"],"award-info":[{"award-number":["4162020"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["GCIS201808","GCIS201710"],"award-info":[{"award-number":["GCIS201808","GCIS201710"]}]},{"name":"Engineering Program Project of CUC","award":["3132015XNG1541"],"award-info":[{"award-number":["3132015XNG1541"]}]},{"name":"Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["2019BDKFJJ012"],"award-info":[{"award-number":["2019BDKFJJ012"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/jiot.2020.2989578","type":"journal-article","created":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T20:47:19Z","timestamp":1587588439000},"page":"8331-8342","source":"Crossref","is-referenced-by-count":21,"title":["A Fog-Assisted Privacy-Preserving Task Allocation in Crowdsourcing"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8674-3988","authenticated-orcid":false,"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qijia","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shenglong","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/978-3-030-31578-8_21"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TDSC.2019.2941481"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ACCESS.2019.2908265"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.comnet.2019.02.008"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ACCESS.2019.2899828"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s11276-019-02094-4"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","article-title":"Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds","volume":"11","author":"yang","year":"2016","journal-title":"IEEE Trans Inf Forensics Security"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/GLOCOM.2016.7842254"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-540-70567-3_10"},{"key":"ref15","article-title":"Providing task allocation and secure deduplication for mobile crowdsensing via fog computing","author":"ni","year":"2018","journal-title":"IEEE Trans Depend Secure Comput"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TSC.2018.2825986"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TMC.2013.150"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/359168.359176"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2729713"},{"key":"ref28","article-title":"Proxy-free privacy-preserving task matching with efficient revocation in crowdsourcing","author":"shu","year":"2018","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref4","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Proc Adv Cryptol Eurocrypt"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/JIOT.2018.2877780"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICC.2019.8761188"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/978-3-642-33392-7_11"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/LCN.2012.6423585"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1378600.1378624"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1002\/cpe.3608"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TETC.2015.2511457"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MCOM.2015.7180511"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1002\/sec.1559"},{"key":"ref1","first-page":"1","article-title":"The rise of crowdsourcing","volume":"14","author":"howe","year":"2006","journal-title":"Wired Mag"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/s10707-016-0251-4"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICC.2017.7997116"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2424321.2424346"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-3-319-64471-4_2"},{"key":"ref23","first-page":"39","article-title":"Respecting user privacy in mobile crowdsourcing","volume":"2","author":"wang","year":"2013","journal-title":"Science"},{"key":"ref26","article-title":"Privacy-preserving task recommendation services for crowdsourcing","author":"shu","year":"2018","journal-title":"IEEE Trans Serv Comput"},{"key":"ref25","first-page":"1","article-title":"Efficient task assignment in spatial crowdsourcing with worker and task privacy protection","volume":"22","author":"liu","year":"2017","journal-title":"GeoInformatica"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9197748\/09076304.pdf?arnumber=9076304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T07:01:15Z","timestamp":1696057275000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9076304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":33,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.2989578","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2020,9]]}}}