{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T17:10:16Z","timestamp":1763572216600},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/jsac.2013.sup.0513024","type":"journal-article","created":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T18:06:03Z","timestamp":1373997963000},"page":"268-278","source":"Crossref","is-referenced-by-count":43,"title":["Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems"],"prefix":"10.1109","volume":"31","author":[{"family":"Rui Zhang","sequence":"first","affiliation":[]},{"family":"Jing Shi","sequence":"additional","affiliation":[]},{"family":"Yanchao Zhang","sequence":"additional","affiliation":[]},{"family":"Chi Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"A peer-to-peer approach to verifiable privacy-preserving aggregation in people-centric urban sensing systems","author":"zhang","year":"2012","journal-title":"Technical Report"},{"key":"ref32","article-title":"Ad hoc on-demand distance vector (AODV) routing","author":"perkins","year":"2003","journal-title":"rFC 3561"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070961"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734592"},{"key":"ref10","article-title":"PEPSI: Privacy enhancing participatory sensing infrastructure","author":"cristofaro","year":"2011","journal-title":"Proc ACM WiSec"},{"key":"ref11","article-title":"CDA: Concealed data aggregation in wireless sensor networks","author":"girao","year":"2004","journal-title":"Proc ACM WiSec"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.20"},{"key":"ref15","first-page":"179","article-title":"Gp2s: Generic privacy-preservation solutions for approximate aggregation of sensor data (concise contribution)","author":"zhang","year":"2008","journal-title":"Proc IEEE Percom"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.144"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180440"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180355"},{"key":"ref28","article-title":"Towards trustworthy parcitipatory sensing","author":"dua","year":"2009","journal-title":"Proc USENIX HotSec"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2007.82"},{"key":"ref27","first-page":"468","article-title":"E-Small Talker: A distributed mobile system for social networking in physical proximity","author":"yang","year":"2010","journal-title":"Proc IEEE ICDCS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182821"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460440"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734593"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378624"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644048"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808850"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1234161.1234179"},{"key":"ref9","article-title":"Mixmaster protocol version 2","author":"moller","year":"2003","journal-title":"IETF Internet Draft"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462147"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132944"},{"key":"ref22","first-page":"1","article-title":"Secure and highly-available aggregation queries in large-scale sensor networks via set sampling","author":"yu","year":"2009","journal-title":"Proc ACMIIEEE IPSN Conf"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460885"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935177"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.45"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.58"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877223"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/6585873\/06559974.pdf?arnumber=6559974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:30:34Z","timestamp":1638217834000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6559974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":33,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2013.sup.0513024","relation":{},"ISSN":["0733-8716"],"issn-type":[{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2013,9]]}}}