{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:08:10Z","timestamp":1729616890524,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/milcom.2015.7357567","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T16:54:21Z","timestamp":1450371261000},"page":"947-953","source":"Crossref","is-referenced-by-count":8,"title":["Achieving secure friend discovery in social strength-aware PMSNs"],"prefix":"10.1109","author":[{"given":"Ben","family":"Niu","sequence":"first","affiliation":[]},{"given":"Yuanyuan","family":"He","sequence":"additional","affiliation":[]},{"family":"Fenghua Li","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.37"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247688"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514412"},{"key":"ref13","article-title":"Efficient Private Matching and Set Intersection","author":"freedman","year":"2004","journal-title":"Proc of LNCS EUROCRYPT"},{"key":"ref14","article-title":"Privacy-preserving set operations","author":"kissner","year":"2005","journal-title":"Proc CRYPTO '99 LNCS"},{"key":"ref15","article-title":"(if) size matters: size-hiding private set intersection","author":"ateniese","year":"2011","journal-title":"Proceedings of PKC'98 LNCS"},{"key":"ref16","article-title":"Linear-complexity private set intersection protocols secure in malicious model","author":"cristofaro","year":"2010","journal-title":"ASIACRYPT Proceedings LNCS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"593","DOI":"10.3233\/JCS-2005-13401","article-title":"Secure set intersection cardinality with application to association rule mining","volume":"13","author":"vaidya","year":"2005","journal-title":"Computer Security"},{"key":"ref19","article-title":"Veneta: Server-less friend-of-friend detection in mobile social networking","author":"von arb","year":"2008","journal-title":"Proc of IEEE WiMob"},{"key":"ref28","article-title":"Secure friend discovery in mobile social networks","author":"wei","year":"2011","journal-title":"Proc of IEEE INFOCOM"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0274-2"},{"key":"ref27","article-title":"Linear-complexity private set intersection protocols secure in macilious model","author":"cristofaro","year":"2010","journal-title":"ASIACRYPT Proceedings LNCS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195574"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934958"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.56"},{"key":"ref7","article-title":"Are you really my friend? exactly spatio-temporal matching scheme in privacy-aware mobile social networks","author":"niu","year":"2014","journal-title":"Proc of EAI SecureComm"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592678"},{"key":"ref9","article-title":"Ebm-an entropy-baed model to infer social strength from spatiotemporal data","author":"huy","year":"2013","journal-title":"Proc of ACM SIGMOD"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653692"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513056"},{"key":"ref22","article-title":"Weight-aware private matching scheme for proximity-based mobile social networks","author":"niu","year":"2013","journal-title":"Proc of IEEE Globecom"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2013.70"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883965"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5583030"},{"key":"ref25","article-title":"Study on grey relation analysis based on entropy method in evaluation of logistics center location","author":"lv","year":"2011","journal-title":"Proc of the IEEE ICMTMA"}],"event":{"name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","start":{"date-parts":[[2015,10,26]]},"location":"Tampa, FL, USA","end":{"date-parts":[[2015,10,28]]}},"container-title":["MILCOM 2015 - 2015 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347040\/7357245\/07357567.pdf?arnumber=7357567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T13:07:59Z","timestamp":1567429679000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7357567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/milcom.2015.7357567","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}