{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:48:48Z","timestamp":1742802528886},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/wcnc.2016.7564968","type":"proceedings-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T18:07:55Z","timestamp":1475777275000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["A practical group matching scheme for privacy-aware users in mobile social networks"],"prefix":"10.1109","author":[{"given":"Fenghua","family":"Li","sequence":"first","affiliation":[]},{"given":"Hanyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"He","sequence":"additional","affiliation":[]},{"given":"Jiafeng","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440630"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_15"},{"key":"ref12","article-title":"When private set intersection meets big data: an efficient and scalable protocol","author":"changyu","year":"2013","journal-title":"Proc of ACM CCS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566867"},{"key":"ref14","article-title":"An analysis of power consumption in a smartphone","author":"carroll","year":"2010","journal-title":"Proc of ACM USENIXATC"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247681"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195574"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503199"},{"key":"ref5","article-title":"Weight-aware private matching scheme for proximity-based mobile social networks","author":"niu","year":"2013","journal-title":"Proc of IEEEGLOBECOM"},{"key":"ref8","article-title":"Are you really my friend? exactly spatio-temporal matching scheme in privacy-aware mobile social networks","author":"niu","year":"2014","journal-title":"Proc of EAI SecureComm"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.146"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2279541"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653692"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357567"}],"event":{"name":"2016 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2016,4,3]]},"location":"Doha, Qatar","end":{"date-parts":[[2016,4,6]]}},"container-title":["2016 IEEE Wireless Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7536276\/7564633\/07564968.pdf?arnumber=7564968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T11:56:18Z","timestamp":1476359778000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7564968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2016.7564968","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}