{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:48:03Z","timestamp":1767772083025,"version":"3.37.3"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"crossref","award":["653704"],"award-info":[{"award-number":["653704"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1016\/j.comcom.2015.07.017","type":"journal-article","created":{"date-parts":[[2015,7,17]],"date-time":"2015-07-17T20:46:40Z","timestamp":1437166000000},"page":"263-270","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":25,"special_numbering":"PB","title":["Lightweight private proximity testing for geospatial social networks"],"prefix":"10.1016","volume":"73","author":[{"given":"Panayiotis","family":"Kotzanikolaou","sequence":"first","affiliation":[]},{"given":"Constantinos","family":"Patsakis","sequence":"additional","affiliation":[]},{"given":"Emmanouil","family":"Magkos","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Korakakis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2010","series-title":"Personal Connections in the Digital Age","author":"Baym","key":"10.1016\/j.comcom.2015.07.017_bib0001"},{"key":"10.1016\/j.comcom.2015.07.017_bib0002","series-title":"Proceedings of 30th IEEE Symposium on Security and Privacy","first-page":"173","article-title":"De-anonymizing Social Networks","author":"Narayanan","year":"2009"},{"issue":"1","key":"10.1016\/j.comcom.2015.07.017_bib0003","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","article-title":"Facebook and online privacy: attitudes, behaviors, and unintended consequences","volume":"15","author":"Debatin","year":"2009","journal-title":"J. Computer-Med. Commun."},{"issue":"3","key":"10.1016\/j.comcom.2015.07.017_bib0004","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MIC.2011.29","article-title":"Location-related privacy in geo-social networks","volume":"15","author":"Ruiz Vicente","year":"2011","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/j.comcom.2015.07.017_bib0005","series-title":"Proceedings of 31st International Conference on Distributed Computing Systems (ICDCS)","first-page":"740","article-title":"Location cheating: a security challenge to location-based social network services","author":"He","year":"2011"},{"key":"10.1016\/j.comcom.2015.07.017_bib0006","series-title":"Proceedings of the 13th International Conference on Ubiquitous Computing, UbiComp\u201911","first-page":"177","article-title":"Who\u2019s your best friend?: targeted privacy attacks in location-sharing social networks","author":"Kostakos","year":"2011"},{"key":"10.1016\/j.comcom.2015.07.017_bib0007","series-title":"Proceedings of International Conference on Ubiquitous Computing, UbiComp","first-page":"898","article-title":"We know where you live: privacy characterization of foursquare behavior","author":"Pontes","year":"2012"},{"issue":"11","key":"10.1016\/j.comcom.2015.07.017_bib0008","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/MCOM.2013.6658662","article-title":"A survey of privacy vulnerabilities and defenses in geosocial networks","volume":"51","author":"Carbunar","year":"2013","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comcom.2015.07.017_bib0009","first-page":"bxu066","article-title":"Privacy and security for multimedia content shared on osns: issues and countermeasures","author":"Patsakis","year":"2014","journal-title":"Comput. J."},{"key":"10.1016\/j.comcom.2015.07.017_sbref0010","series-title":"Proceedings of the International Conference on Mobile, Secure and Programmable Networking (MSPN\u20192015)","article-title":"Analysis of privacy and security exposure in mobile dating applications","author":"Patsakis","year":"2015"},{"key":"10.1016\/j.comcom.2015.07.017_bib0011","article-title":"All your location are belong to us: breaking mobile social networks for automated user location tracking","author":"Li","year":"2013","journal-title":"arXiv preprint arXiv:1310.2547"},{"key":"10.1016\/j.comcom.2015.07.017_bib0012","series-title":"ICT Systems Security and Privacy Protection","first-page":"185","article-title":"Playing hide and seek with mobile dating applications","author":"Qin","year":"2014"},{"key":"10.1016\/j.comcom.2015.07.017_bib0013","series-title":"NDSS","article-title":"Location privacy via private proximity testing","author":"Narayanan","year":"2011"},{"key":"10.1016\/j.comcom.2015.07.017_bib0014","series-title":"Privacy Enhancing Technologies","first-page":"62","article-title":"Louis, Lester and Pierre: three protocols for location privacy","author":"Zhong","year":"2007"},{"key":"10.1016\/j.comcom.2015.07.017_bib0015","series-title":"Proceedings of the 12th IMA International Conference on Cryptography and Coding","first-page":"236","article-title":"A new protocol for the nearby friend problem","author":"Chatterjee","year":"2009"},{"key":"10.1016\/j.comcom.2015.07.017_bib0016","series-title":"Financial Cryptography and Data Security","first-page":"73","article-title":"Efficient private proximity testing with GSM location sketches","author":"Lin","year":"2012"},{"key":"10.1016\/j.comcom.2015.07.017_bib0017","series-title":"Privacy in Statistical Databases","first-page":"312","article-title":"Towards secure and practical location privacy through private equality testing","author":"Magkos","year":"2014"},{"key":"10.1016\/j.comcom.2015.07.017_bib0018","series-title":"Handbook of Database Security","first-page":"531","article-title":"Privacy-enhanced location-based access control","author":"Ardagna","year":"2008"},{"issue":"2","key":"10.1016\/j.comcom.2015.07.017_bib0019","doi-asserted-by":"crossref","first-page":"48","DOI":"10.4018\/jitsa.2011070104","article-title":"Cryptographic approaches for privacy preservation in location-based services: a survey","volume":"4","author":"Magkos","year":"2011","journal-title":"Int. J. Inf. Technol. Syst. Approach"},{"issue":"1","key":"10.1016\/j.comcom.2015.07.017_bib0020","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s00779-012-0633-z","article-title":"A classification of location privacy attacks and approaches","volume":"18","author":"Wernke","year":"2014","journal-title":"Pers. Ubiquitous Comput."},{"issue":"6","key":"10.1016\/j.comcom.2015.07.017_bib0021","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1145\/293347.293350","article-title":"Private information retrieval","volume":"45","author":"Chor","year":"1998","journal-title":"J. ACM"},{"year":"2009","series-title":"A Fully Homomorphic Encryption Scheme (Ph.D. thesis)","author":"Gentry","key":"10.1016\/j.comcom.2015.07.017_bib0022"},{"key":"10.1016\/j.comcom.2015.07.017_bib0023","series-title":"Advances in Spatial and Temporal Databases","first-page":"405","article-title":"A location privacy aware friend locator","author":"\u0160ik\u0161nys","year":"2009"},{"key":"10.1016\/j.comcom.2015.07.017_bib0024","series-title":"Proceedings of Eleventh International Conference on Mobile Data Management (MDM)","first-page":"75","article-title":"Private and flexible proximity detection in mobile social networks","author":"Siksnys","year":"2010"},{"issue":"4","key":"10.1016\/j.comcom.2015.07.017_bib0025","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s00778-010-0213-7","article-title":"Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies","volume":"20","author":"Mascetti","year":"2011","journal-title":"VLDB J."},{"issue":"1","key":"10.1016\/j.comcom.2015.07.017_bib0026","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/TMC.2012.247","article-title":"Preserving location privacy in geosocial applications","volume":"13","author":"Puttaswamy","year":"2014","journal-title":"IEEE Trans. Mobile Comput."},{"key":"10.1016\/j.comcom.2015.07.017_bib0027","series-title":"Advances in Cryptology-CRYPTO 2007","first-page":"535","article-title":"Deterministic and efficiently searchable encryption","author":"Bellare","year":"2007"},{"key":"10.1016\/j.comcom.2015.07.017_bib0028","series-title":"Topics in Cryptology-CT-RSA 2010","first-page":"119","article-title":"Probabilistic public key encryption with equality test","author":"Yang","year":"2010"},{"key":"10.1016\/j.comcom.2015.07.017_bib0029","series-title":"Information Security and Privacy","first-page":"389","article-title":"Towards public key encryption scheme supporting equality test with fine-grained authorization","author":"Tang","year":"2011"},{"issue":"5","key":"10.1016\/j.comcom.2015.07.017_bib0030","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/229459.229469","article-title":"Comparing information without leaking it","volume":"39","author":"Fagin","year":"1996","journal-title":"Commun. ACM"},{"key":"10.1016\/j.comcom.2015.07.017_bib0031","series-title":"Advances in Cryptology-EUROCRYPT 2004","first-page":"1","article-title":"Efficient private matching and set intersection","author":"Freedman","year":"2004"},{"key":"10.1016\/j.comcom.2015.07.017_bib0032","series-title":"Advances in Cryptology\u2013CRYPTO 2005","first-page":"241","article-title":"Privacy-preserving set operations","author":"Kissner","year":"2005"},{"key":"10.1016\/j.comcom.2015.07.017_bib0033","series-title":"Proceedings of IEEE Conference on Computer Communications, INFOCOM","first-page":"37","article-title":"Near-pri: Private, proximity based location sharing","author":"Novak","year":"2014"},{"key":"10.1016\/j.comcom.2015.07.017_bib0034","series-title":"Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks","first-page":"113","article-title":"Private proximity testing with an untrusted server","author":"Saldamli","year":"2013"},{"key":"10.1016\/j.comcom.2015.07.017_bib0035","series-title":"Proceedings of IEEE 14th International Conference on Mobile Data Management (MDM)","first-page":"87","article-title":"A practical location privacy attack in proximity services","volume":"vol. 1","author":"Mascetti","year":"2013"},{"issue":"5","key":"10.1016\/j.comcom.2015.07.017_bib0036","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/242896.242897","article-title":"Strong password-only authenticated key exchange","volume":"26","author":"Jablon","year":"1996","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.comcom.2015.07.017_bib0037","series-title":"Computer Security\u2013ESORICS 2012","first-page":"361","article-title":"Sharp: Private proximity test and secure handshake with cheat-proof location tags","author":"Zheng","year":"2012"},{"issue":"6","key":"10.1016\/j.comcom.2015.07.017_bib0038","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/j.comcom.2015.07.017_bib0039","series-title":"Proceedings of the Eighth IEEE\/ACM\/IFIP International Conference on Hardware\/Software Codesign and System Synthesis","first-page":"105","article-title":"Accurate online power estimation and automatic battery behavior based power model generation for smartphones","author":"Zhang","year":"2010"},{"issue":"5","key":"10.1016\/j.comcom.2015.07.017_bib0040","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1002\/ett.4460080506","article-title":"A secure and optimally efficient multi-authority election scheme","volume":"8","author":"Cramer","year":"1997","journal-title":"Eur. Trans. Telecommun."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366415002558?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366415002558?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T03:22:18Z","timestamp":1572924138000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366415002558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":40,"alternative-id":["S0140366415002558"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2015.07.017","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2016,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Lightweight private proximity testing for geospatial social networks","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2015.07.017","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}