{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:38Z","timestamp":1740099158420,"version":"3.37.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_61","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T16:14:23Z","timestamp":1536768863000},"page":"706-717","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A VANET Anonymous Authentication Mechanism for Multi-level Application Scenarios"],"prefix":"10.1007","author":[{"given":"Xiaoliang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jianming","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Baowei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"61_CR1","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TPDS.2011.259","volume":"23","author":"W Cheng","year":"2012","unstructured":"Cheng, W., Cheng, X., Song, M., Chen, B., Zhao, W.W.: On the design and deployment of RFID assisted navigation systems for VANETs. IEEE Trans. Parallel Distrib. Syst. 23, 1267\u20131274 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"61_CR2","doi-asserted-by":"publisher","first-page":"65","DOI":"10.4156\/jnit.vol4.issue1.9","volume":"4","author":"A Mojtaba","year":"2013","unstructured":"Mojtaba, A., Wan, H.H., Mazdak, Z., Sasan, K., Eghbal, G.: Implementation and evaluation of lightweight encryption algorithms suitable for RFID. J. Next Gener. Inf. Technol. 4, 65\u201377 (2013)","journal-title":"J. Next Gener. Inf. Technol."},{"key":"61_CR3","doi-asserted-by":"crossref","unstructured":"Sun, X., Lin, X., Ho, P.H.: Secure vehicular communications based on group signature and id-based signature scheme. In: IEEE International Conference on Communications, pp. 1539\u20131545. IEEE Press, New York (2007)","DOI":"10.1109\/ICC.2007.258"},{"key":"61_CR4","doi-asserted-by":"crossref","unstructured":"Guo, J., Baugh, J.P., Wang, S.: A group signature based secure and privacy-preserving vehicular communication framework. In: Mobile Networking for Vehicular Environments, pp. 103\u2013108 (2007)","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Calandriello, G., Papadimitratos, P., Hubaux, J.P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: International Workshop on Vehicular Ad Hoc Networks, Vanet 2007, Montr\u00e9al, Qu\u00e9bec, Canada, September, pp. 19\u201328 (2007)","DOI":"10.1145\/1287748.1287752"},{"key":"61_CR6","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","volume":"21","author":"J Sun","year":"2010","unstructured":"Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21, 1227\u20131239 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"61_CR7","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1109\/TPDS.2014.2308215","volume":"26","author":"J Li","year":"2015","unstructured":"Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26, 938\u2013948 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"61_CR8","first-page":"106","volume":"4","author":"JY Bevish","year":"2014","unstructured":"Bevish, J.Y.: An efficient authentication scheme for VANET using Cha Cheon\u2019s ID based signatures. Indian J. Appl. Res. 4, 106\u2013109 (2014)","journal-title":"Indian J. Appl. Res."},{"key":"61_CR9","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10, 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"61_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJSNET.2018.094696","volume":"13","author":"X Wang","year":"2017","unstructured":"Wang, X., Li, S., Zhao, S., Xia, Z., Bai, L.: A vehicular ad hoc network privacy protection scheme without a trusted third party. Int. J. Distrib. Sens. Netw. 13, 1\u201310 (2017)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"61_CR11","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"DB He","year":"2015","unstructured":"He, D.B., Zeadally, S., Xu, B.W., Huang, X.Y.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensic Secur. 10, 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"61_CR12","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TC.2012.188","volume":"63","author":"TW Chim","year":"2014","unstructured":"Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: VSPN: VANET-based secure and privacy-preserving navigation. IEEE Trans. Comput. 63, 510\u2013524 (2014)","journal-title":"IEEE Trans. Comput."},{"key":"61_CR13","doi-asserted-by":"publisher","first-page":"5190","DOI":"10.1109\/TVT.2009.2028145","volume":"58","author":"EVD Berg","year":"2009","unstructured":"Berg, E.V.D., Zhang, T., Pietrowicz, S.: Blend-in: a privacy-enhancing certificate-selection method for vehicular communication. IEEE Trans. Veh. Technol. 58, 5190\u20135199 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"61_CR14","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-32427-7_22","volume":"2012","author":"J Chen","year":"2012","unstructured":"Chen, J., Xu, H., Zhu, L.: Query-aware location privacy model based on p-sensitive and k-anonymity for road networks. Internet Things 2012, 157\u2013165 (2012)","journal-title":"Internet Things"},{"key":"61_CR15","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.adhoc.2015.05.016","volume":"36","author":"C Caballero-Gil","year":"2016","unstructured":"Caballero-Gil, C., Molina-Gil, J., Hernandez-Serrano, J., Leon, O., Soriano-Ibanez, M.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. 36, 482\u2013494 (2016)","journal-title":"Ad Hoc Netw."},{"key":"61_CR16","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1007\/s00607-014-0393-x","volume":"98","author":"MZ Wang","year":"2016","unstructured":"Wang, M.Z., Liu, D., Zhu, L.H., Xu, Y.J., Wang, F.: LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication. Computing 98, 685\u2013708 (2016)","journal-title":"Computing"},{"key":"61_CR17","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","volume":"65","author":"F Wang","year":"2016","unstructured":"Wang, F., Xu, Y.J., Zhang, H.W., Zhang, Y.J., Zhu, L.H.: 2FLIP: a two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65, 896\u2013911 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"61_CR18","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1109\/TVT.2015.2406877","volume":"66","author":"SF Tzeng","year":"2017","unstructured":"Tzeng, S.F., Horng, S.J., Li, T.R., Wang, X., Huang, P.H., Khan, M.K.: Enhancing security and privacy for identity-based batch verification scheme in VANETs. IEEE Trans. Veh. Technol. 66, 3235\u20133248 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"61_CR19","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.future.2016.11.024","volume":"78","author":"P Vijayakumar","year":"2018","unstructured":"Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G.: Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur. Gener. Comp. Syst. 78, 943\u2013955 (2018)","journal-title":"Futur. Gener. Comp. Syst."},{"key":"61_CR20","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44, 519\u2013521 (1985)","journal-title":"Math. Comput."},{"key":"61_CR21","first-page":"9","volume":"31","author":"W Chao","year":"2010","unstructured":"Chao, W., Xiang-yong, S., Zhi-hua, N.: The research of the promotion for ECDSA algorithm based on Montgomery-form ECC. J. Commun. 31, 9\u201313 (2010)","journal-title":"J. Commun."},{"key":"61_CR22","unstructured":"Pathak, V., Yao, D., Iftode, L.: Securing location aware services over VANET using geographical secure path routing. In: IEEE International Conference on Vehicular Electronics and Safety, pp. 346\u2013353. IEEE Press, New York (2010)"},{"key":"61_CR23","first-page":"30","volume":"33","author":"W Chao","year":"2012","unstructured":"Chao, W., Guang-yue, H., Huan-guo, Z.: Lightweight security architecture design for wireless sensor network. J. Commun. 33, 30\u201335 (2012)","journal-title":"J. Commun."},{"key":"61_CR24","doi-asserted-by":"publisher","unstructured":"Simmons G.J.: The prisoners\u2019 problem and the subliminal channel. In: Chaum D. (ed.) Advances in Cryptology. Springer, Boston (1984). https:\/\/doi.org\/10.1007\/978-1-4684-4730-9_5","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"61_CR25","first-page":"25","volume":"29","author":"H Wang","year":"2008","unstructured":"Wang, H., Li, B., Yu, W.: Montgomery algorithm on elliptic curves over finite fields of character three. J. Commun. 29, 25\u201328 (2008)","journal-title":"J. Commun."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T05:11:15Z","timestamp":1662009075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}