{"id":"https://openalex.org/W2064706622","doi":"https://doi.org/10.1145/2746285.2764870","title":"Poster","display_name":"Poster","publication_year":2015,"publication_date":"2015-06-12","ids":{"openalex":"https://openalex.org/W2064706622","doi":"https://doi.org/10.1145/2746285.2764870","mag":"2064706622"},"language":"en","primary_location":{"id":"doi:10.1145/2746285.2764870","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2746285.2764870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101727014","display_name":"Depeng Li","orcid":"https://orcid.org/0000-0002-7072-0201"},"institutions":[{"id":"https://openalex.org/I117965899","display_name":"University of Hawai\u02bbi at M\u0101noa","ror":"https://ror.org/01wspgy28","country_code":"US","type":"education","lineage":["https://openalex.org/I117965899"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Depeng Li","raw_affiliation_strings":["University of Hawaii at Manoa, Honolulu, HI, USA"],"affiliations":[{"raw_affiliation_string":"University of Hawaii at Manoa, Honolulu, HI, USA","institution_ids":["https://openalex.org/I117965899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101727014"],"corresponding_institution_ids":["https://openalex.org/I117965899"],"apc_list":null,"apc_paid":null,"fwci":0.4314,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.76081964,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"393","last_page":"394"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8046091794967651},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.643366277217865},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6231692433357239},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5377713441848755},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5285483598709106},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5190771222114563},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.48019373416900635},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4503258764743805},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4213532507419586},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.38759368658065796},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17262661457061768},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11856168508529663}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8046091794967651},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.643366277217865},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6231692433357239},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5377713441848755},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5285483598709106},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5190771222114563},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.48019373416900635},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4503258764743805},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4213532507419586},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.38759368658065796},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17262661457061768},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11856168508529663},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2746285.2764870","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2746285.2764870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1981471876","https://openalex.org/W1991895738","https://openalex.org/W2104803737","https://openalex.org/W2109426455","https://openalex.org/W2135289568","https://openalex.org/W6676538461"],"related_works":["https://openalex.org/W2887779253","https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W3185918024","https://openalex.org/W3138333794","https://openalex.org/W2773408865","https://openalex.org/W4226426276","https://openalex.org/W2083287929","https://openalex.org/W3132022922","https://openalex.org/W4241535341"],"abstract_inverted_index":{"Current":[0],"popular":[1],"schemes":[2],"e.g.":[3,78],"homomorphic":[4],"cryptography":[5],"are":[6,66],"extensively":[7],"deployed":[8],"to":[9,100],"preserve":[10],"privacy":[11,20,26,31,60,83],"in":[12,50,110],"a":[13,18,38,51,58,73],"limited":[14],"level":[15],"but":[16],"without":[17],"formal":[19],"model,":[21,81],"we":[22,36,62,98],"can":[23,106],"neither":[24],"offer":[25],"guarantee":[27],"nor":[28],"quantify":[29],"the":[30,46,64,70,102],"loss.":[32],"In":[33,57],"this":[34,111],"paper,":[35],"raise":[37],"few":[39],"privacy-related":[40],"questions,":[41],"one":[42],"after":[43],"another,":[44],"with":[45,69,87],"e-Lock":[47],"state":[48],"changes":[49],"smart":[52],"home":[53],"as":[54],"an":[55],"example.":[56],"novel":[59],"framework":[61,103],"proposed,":[63],"questions":[65],"partially":[67],"addressed":[68],"utilization":[71],"of":[72,75],"set":[74],"theoretical":[76],"models":[77],"hidden":[79],"markov":[80],"differential":[82],"and":[84,104],"information":[85],"flow":[86],"belief.":[88],"Since":[89],"our":[90],"paper":[91],"is":[92],"still":[93],"at":[94],"its":[95],"start":[96],"phase,":[97],"plan":[99],"accomplish":[101],"wish":[105],"inspire":[107],"colleagues'":[108],"interests":[109],"area.":[112]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
