{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:48:37Z","timestamp":1763466517552,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61125020"],"award-info":[{"award-number":["61125020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["CERG-61361166009"],"award-info":[{"award-number":["CERG-61361166009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61103187"],"award-info":[{"award-number":["61103187"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61472211"],"award-info":[{"award-number":["61472211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["6142219"],"award-info":[{"award-number":["6142219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61190110"],"award-info":[{"award-number":["61190110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1035894"],"award-info":[{"award-number":["CNS-1035894"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["ECCS-1247944"],"award-info":[{"award-number":["ECCS-1247944"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["ECCS-1343306"],"award-info":[{"award-number":["ECCS-1343306"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1436786"],"award-info":[{"award-number":["1436786"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61170216"],"award-info":[{"award-number":["61170216"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61228202"],"award-info":[{"award-number":["61228202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2015,9,1]]},"DOI":"10.1109\/tmc.2014.2366773","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T19:30:37Z","timestamp":1415043037000},"page":"1888-1902","source":"Crossref","is-referenced-by-count":49,"title":["Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks"],"prefix":"10.1109","volume":"14","author":[{"given":"Lan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiang-Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kebin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Taeho","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Outsource photo sharing and searching for mobile devices with privacy protection","author":"zhang","year":"2014","journal-title":"arXiv preprint arXiv 1410 6589"},{"key":"ref32","article-title":"Cloud-based privacy preserving image storage, sharing and search","author":"zhang","year":"2014","journal-title":"arXiv preprint arXiv 1410 6593"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/1810931.1810934"},{"key":"ref30","article-title":"Mechanism design for finding experts using locally constructed social referral web","author":"zhang","year":"2014","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref36","first-page":"361","article-title":"Sharp: Private proximity test and secure handshake with cheat-proof location tags","author":"zheng","year":"0","journal-title":"Proc Eur Symp Res Comput Security"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/INFCOM.2012.6195574"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/INFCOM.2013.6566844"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICPP.2002.1040894"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/INFCOM.2013.6567071"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIFS.2014.2368352"},{"key":"ref13","article-title":"Collusion-tolerable privacy-preserving sum and product calculation without secure channel","author":"jung","year":"2014","journal-title":"IEEE Trans Dependable Secure Comput"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/INFCOM.2013.6567070"},{"key":"ref15","first-page":"241","article-title":"Privacy-preserving set operations","author":"kissner","year":"0","journal-title":"Proc Adv Cryptol &#x2014;CRYPTO"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/INFCOM.2011.5935065"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/INFCOM.2013.6567085"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TNET.2012.2208983"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/345508.345564"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICDCS.2010.56"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref27","first-page":"184","article-title":"VENETA: Serverless friend-of-friend detection in mobile social networking","author":"arb","year":"0","journal-title":"Proc IEEE Int Conf Wireless Mobile Comput Netw Commun"},{"key":"ref3","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"bethencourt","year":"0","journal-title":"Proc IEEE Symp Security Privacy"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/INFCOM.2011.5934958"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/MNET.2010.5510913"},{"key":"ref5","first-page":"143","article-title":"Practical private set intersection protocols with linear complexity","author":"de cristofaro","year":"0","journal-title":"14th International Conference on Financial Cryptography and Data Security"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1180405.1180418"},{"key":"ref7","first-page":"1","article-title":"Efficient private matching and set intersection","author":"freedman","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn"},{"year":"0","key":"ref2"},{"key":"ref9","first-page":"368","article-title":"Lexical normalisation of short text messages: Makn sens a# twitter","volume":"1","author":"han","year":"0","journal-title":"Proc Proc 49th Annu Meeting Assoc Comput Linguist Human Lang Technol"},{"year":"0","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-3-540-69311-6_21"},{"key":"ref22","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"0","journal-title":"Proc 24th Annu Int Conf Theory Appl Cryptographic Techn"},{"key":"ref21","first-page":"197","article-title":"SAS-based authenticated key agreement","author":"pasini","year":"0","journal-title":"Proc 11th Int Conf Practice Theory Public Key Cryptography"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1006\/csla.2001.0169"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.14778\/1687553.1687611"},{"key":"ref26","first-page":"2291","article-title":"Relationship classification in large scale online social networks and its impact on information","author":"tang","year":"0","journal-title":"Proc IEEE InfoCom"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/MC.2002.1012427"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/7175142\/06945371.pdf?arnumber=6945371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:12Z","timestamp":1642003152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6945371\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,1]]},"references-count":36,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2014.2366773","relation":{},"ISSN":["1536-1233"],"issn-type":[{"type":"print","value":"1536-1233"}],"subject":[],"published":{"date-parts":[[2015,9,1]]}}}