{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T21:01:27Z","timestamp":1720472487689},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836202","61772383","61702379"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Joint Fund of Ministry of Education of China for Equipment Pre-research","award":["6141A02033341"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1016\/j.future.2020.09.033","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T22:45:21Z","timestamp":1601419521000},"page":"448-458","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":5,"special_numbering":"C","title":["SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures"],"prefix":"10.1016","volume":"115","author":[{"given":"Jing","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jiong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kun","family":"He","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.future.2020.09.033_b1","article-title":"The rise of crowdsourcing","volume":"14","author":"Howe","year":"2006","journal-title":"Wired Mag."},{"issue":"1","key":"10.1016\/j.future.2020.09.033_b2","doi-asserted-by":"crossref","DOI":"10.1145\/3148148","article-title":"Quality control in crowdsourcing: A survey of quality attributes, assessment techniques, and assurance actions","volume":"51","author":"Daniel","year":"2018","journal-title":"ACM Comput. Surv."},{"issue":"8","key":"10.1016\/j.future.2020.09.033_b3","doi-asserted-by":"crossref","DOI":"10.1109\/TKDE.2018.2797962","article-title":"Slade: A smart large-scale task decomposer in crowdsourcing","volume":"30","author":"Tong","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.future.2020.09.033_b4","doi-asserted-by":"crossref","unstructured":"Z. Feng, Y. Zhu, Q. Zhang, L. Ni, A. Vasilakos, TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing, in: Proceedings of IEEE INFOCOM, 2014.","DOI":"10.1109\/INFOCOM.2014.6848055"},{"key":"10.1016\/j.future.2020.09.033_b5","doi-asserted-by":"crossref","unstructured":"A. Lundgard, Y. Yang, M.L. Foster, W.S. Lasecki, Bolt: Instantaneous crowdsourcing via just-in-time training, in: Proceedings of ACM CHI, 2018.","DOI":"10.1145\/3173574.3174041"},{"key":"10.1016\/j.future.2020.09.033_b6","doi-asserted-by":"crossref","unstructured":"C. Miao, Q. Li, H. Xiao, W. Jiang, M. Huai, L. Su, Towards data poisoning attacks in crowd sensing systems, in: Proceedings of ACM Mobihoc, 2018.","DOI":"10.1145\/3209582.3209594"},{"key":"10.1016\/j.future.2020.09.033_b7","doi-asserted-by":"crossref","unstructured":"S. Dow, A. Kulkarni, S. Klemmer, B. Hartmann, Shepherding the crowd yields better work, in: Proceedings of ACM CSCW, 2012.","DOI":"10.1145\/2145204.2145355"},{"key":"10.1016\/j.future.2020.09.033_b8","doi-asserted-by":"crossref","unstructured":"J.C. Chang, S. Amershi, E. Kamar, Revolt: Collaborative crowdsourcing for labeling machine learning datasets, in: Proceedings of ACM CHI, 2017.","DOI":"10.1145\/3025453.3026044"},{"issue":"99","key":"10.1016\/j.future.2020.09.033_b9","article-title":"A survey on security, privacy and trust in mobile crowdsourcing","volume":"PP","author":"Feng","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2020.09.033_b10","doi-asserted-by":"crossref","unstructured":"D. Zhao, X.-Y. Li, H. Ma, How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint, in: Proceedings of IEEE INFOCOM, 2014.","DOI":"10.1109\/INFOCOM.2014.6848053"},{"key":"10.1016\/j.future.2020.09.033_b11","doi-asserted-by":"crossref","unstructured":"X. Zhang, G. Xue, R. Yu, D. Yang, J. Tang, Truthful incentive mechanisms for crowdsourcing, in: Proceedings of IEEE INFOCOM, 2015.","DOI":"10.1109\/INFOCOM.2015.7218676"},{"issue":"1","key":"10.1016\/j.future.2020.09.033_b12","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2015.2478739","article-title":"Designing secure and dependable mobile sensing mechanisms with revenue guarantees","volume":"11","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2020.09.033_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2018.02.008","article-title":"Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems","volume":"135","author":"Wang","year":"2018","journal-title":"Comput. Netw."},{"issue":"10","key":"10.1016\/j.future.2020.09.033_b14","doi-asserted-by":"crossref","DOI":"10.14778\/2732951.2732966","article-title":"A framework for protecting worker location privacy in spatial crowdsourcing","volume":"7","author":"To","year":"2014","journal-title":"Proc. VLDB Endow."},{"issue":"11","key":"10.1016\/j.future.2020.09.033_b15","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2018.2811481","article-title":"Blind filtering at third parties: An efficient privacy-preserving framework for location-based services","volume":"17","author":"Chen","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"5\u20136","key":"10.1016\/j.future.2020.09.033_b16","article-title":"Preserving worker privacy in crowdsourcing","volume":"28","author":"Kajino","year":"2014","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.future.2020.09.033_b17","article-title":"Privacy-preserving task recommendation services for crowdsourcing","author":"Shu","year":"2018","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"10.1016\/j.future.2020.09.033_b18","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-013-2320-2","article-title":"An evaluation framework for software crowdsourcing","volume":"7","author":"Wu","year":"2013","journal-title":"Front. Comput. Sci."},{"issue":"Supplement C","key":"10.1016\/j.future.2020.09.033_b19","article-title":"A survey of the use of crowdsourcing in software engineering","volume":"126","author":"Mao","year":"2017","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.future.2020.09.033_b20","doi-asserted-by":"crossref","unstructured":"K.-J. Stol, B. Fitzgerald, Two\u2019s. Company, Two\u2019s Company Three\u2019s a Crowd: A Case Study of Crowdsourcing Software Development, in: Proceedings of ICSE, 2014.","DOI":"10.1145\/2568225.2568249"},{"key":"10.1016\/j.future.2020.09.033_b21","doi-asserted-by":"crossref","unstructured":"T. Qin, H. Ma, D. Zhao, T. Li, J. Chen, Crowdsourcing based event reporting system using smartphones with accurate localization and photo tamper detection, in: Proceedings of BigCom, 2015.","DOI":"10.1007\/978-3-319-22047-5_12"},{"key":"10.1016\/j.future.2020.09.033_b22","doi-asserted-by":"crossref","unstructured":"D. Chaum, E. Van\u00a0Heyst, Group signatures, in: Proceedings of EUROCRYPT, 1991.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"10.1016\/j.future.2020.09.033_b23","doi-asserted-by":"crossref","unstructured":"M. Bellare, D. Micciancio, B. Warinschi, Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, in: Proceedings of EUROCRYPT, 2003.","DOI":"10.1007\/3-540-39200-9_38"},{"key":"10.1016\/j.future.2020.09.033_b24","article-title":"Dynamic group-oriented provable data possession in the cloud","author":"He","year":"2019","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.future.2020.09.033_b25","doi-asserted-by":"crossref","unstructured":"D. Boneh, X. Boyen, Short signatures without random oracles, in: Proceedings of EUROCRYPT, 2004.","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"10.1016\/j.future.2020.09.033_b26","doi-asserted-by":"crossref","unstructured":"Q. Wu, Y. Mu, W. Susilo, B. Qin, J. Domingo-Ferrer, Asymmetric group key agreement, in: Proceedings of EUROCRYPT, 2009.","DOI":"10.1007\/978-3-642-01001-9_9"},{"key":"10.1016\/j.future.2020.09.033_b27","doi-asserted-by":"crossref","unstructured":"S. Katsumata, S. Yamada, Group signatures without NIZK: From lattices in the standard model, in: Proceedings of EUROCRYPT, 2019.","DOI":"10.1007\/978-3-030-17659-4_11"},{"key":"10.1016\/j.future.2020.09.033_b28","doi-asserted-by":"crossref","unstructured":"J. Chen, S. Yao, Q. Yuan, K. He, S. Ji, R. Du, Certchain: Public and efficient certificate audit based on blockchain for tls connections, in: Proceedings of IEEE INFOCOM, 2018.","DOI":"10.1109\/INFOCOM.2018.8486344"},{"key":"10.1016\/j.future.2020.09.033_b29","article-title":"Pbcert: Privacy-preserving blockchain-based certificate status validation toward mass storage management","volume":"7","author":"Yao","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2020.09.033_b30","unstructured":"A. Fiat, A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, in: Proceedings of CRYPTO, 1987."},{"key":"10.1016\/j.future.2020.09.033_b31","doi-asserted-by":"crossref","unstructured":"A. Bianchi, Y. Shoshitaishvili, C. Kruegel, G. Vigna, Blacksheep: Detecting compromised hosts in homogeneous crowds, in: Proceedings of ACM CCS, 2012.","DOI":"10.1145\/2382196.2382234"},{"key":"10.1016\/j.future.2020.09.033_b32","doi-asserted-by":"crossref","unstructured":"G. Stringhini, C. Kruegel, G. Vigna, Shady paths: Leveraging surfing crowds to detect malicious web pages, in: Proceedings of ACM CCS, 2013.","DOI":"10.1145\/2508859.2516682"},{"key":"10.1016\/j.future.2020.09.033_b33","unstructured":"G. Wang, M. Mohanlal, C. Wilson, X. Wang, M.J. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: Crowdsourcing sybil detection, in: Proceedings of NDSS, 2013."},{"key":"10.1016\/j.future.2020.09.033_b34","doi-asserted-by":"crossref","unstructured":"J. Lin, S. Amini, J.I. Hong, N. Sadeh, J. Lindqvist, J. Zhang, Expectation and purpose: Understanding users\u2019 mental models of mobile app privacy through crowdsourcing, in: Proceedings of ACM UbiComp, 2012.","DOI":"10.1145\/2370216.2370290"},{"issue":"1","key":"10.1016\/j.future.2020.09.033_b35","doi-asserted-by":"crossref","DOI":"10.1007\/s00779-012-0632-0","article-title":"Crowdsourcing privacy preferences in context-aware applications","volume":"18","author":"Toch","year":"2012","journal-title":"Pers. Ubiquitous Comput."},{"issue":"8","key":"10.1016\/j.future.2020.09.033_b36","doi-asserted-by":"crossref","DOI":"10.1109\/MCOM.2015.7180511","article-title":"Security and privacy in mobile crowdsourcing networks: challenges and opportunities","volume":"53","author":"Yang","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.future.2020.09.033_b37","doi-asserted-by":"crossref","unstructured":"Y. Wei, Y. Zhu, H. Zhu, Q. Zhang, G. Xue, Truthful online double auctions for dynamic mobile crowdsourcing, in: Proceedings of IEEE INFOCOM, 2015.","DOI":"10.1109\/INFOCOM.2015.7218592"},{"key":"10.1016\/j.future.2020.09.033_b38","doi-asserted-by":"crossref","unstructured":"A. Xu, X. Feng, Y. Tian, Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q & A, in: Proceedings of IEEE INFOCOM, 2015.","DOI":"10.1109\/INFOCOM.2015.7218643"},{"issue":"Supplement C","key":"10.1016\/j.future.2020.09.033_b39","article-title":"An incentive mechanism with privacy protection in mobile crowdsourcing systems","volume":"102","author":"Wang","year":"2016","journal-title":"Comput. Netw."},{"key":"10.1016\/j.future.2020.09.033_b40","doi-asserted-by":"crossref","unstructured":"G. Wang, T. Wang, H. Zheng, B.Y. Zhao, Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers, in: Proceedings of USENIX Security, 2014.","DOI":"10.1145\/2486001.2491719"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X20305264?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X20305264?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T02:57:13Z","timestamp":1713322633000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X20305264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2]]},"references-count":40,"alternative-id":["S0167739X20305264"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2020.09.033","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2021,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2020.09.033","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}