{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:54:29Z","timestamp":1775253269207,"version":"3.50.1"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030026127","type":"print"},{"value":"9783030026134","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T00:00:00Z","timestamp":1539907200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02613-4_43","type":"book-chapter","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T14:22:39Z","timestamp":1539872559000},"page":"490-497","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature"],"prefix":"10.1007","author":[{"given":"Tianhan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Jiayu","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,19]]},"reference":[{"issue":"8","key":"43_CR1","doi-asserted-by":"publisher","first-page":"2193","DOI":"10.1109\/TITS.2016.2517603","volume":"17","author":"S Jiang","year":"2016","unstructured":"Jiang, S., Zhu, X., Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193\u20132204 (2016)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"43_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","volume":"61","author":"F Sakiz","year":"2017","unstructured":"Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks 61, 33\u201350 (2017)","journal-title":"Ad Hoc Networks"},{"key":"43_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.vehcom.2017.01.002","volume":"7","author":"Hamssa Hasrouny","year":"2017","unstructured":"Hasrouny, H., Samhat, A.E., Bassil, C., et al.: VANet security challenges and solutions: a survey. Vehicular Commun. 7, 7\u201320 (2017)","journal-title":"Vehicular Communications"},{"key":"43_CR4","doi-asserted-by":"publisher","unstructured":"Singh, K.D., Rawat, P., Bonnin, J.M.: J Wireless Com Network (2014) 2014: 49. https:\/\/doi.org\/10.1186\/1687-1499-2014-49","DOI":"10.1186\/1687-1499-2014-49"},{"issue":"17","key":"43_CR5","first-page":"101","volume":"52","author":"G Zhang","year":"2016","unstructured":"Zhang, G., Shi, R., Zhong, H.: Anonymous authentication scheme based on identity in VANET. Comput. Eng. Appl. 52(17), 101\u2013106 (2016)","journal-title":"Comput. Eng. Appl."},{"issue":"6","key":"43_CR6","first-page":"2559","volume":"6","author":"P Sarde","year":"2015","unstructured":"Sarde, P., Banerjee, A.: An Efficient and Secure ID Based Group Signture Scheme from Bilinear Pairings Anonymous authentication scheme based on identity in VANET. Adv. Networking Appl. 6(6), 2559\u20132562 (2015)","journal-title":"Adv. Networking Appl."},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Barreto, P.S.L.M., Libert, B., Mccullagh, N., et al.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: International Conference on Theory and Application of Cryptology and Information Security, pp. 515\u2013532. Springer (2005)","DOI":"10.1007\/11593447_28"},{"issue":"3","key":"43_CR8","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000)","journal-title":"J. Cryptol."},{"key":"43_CR9","doi-asserted-by":"publisher","first-page":"3445","DOI":"10.1016\/j.proeng.2011.08.645","volume":"15","author":"L Zhang","year":"2011","unstructured":"Zhang, L., Hu, Y., Wu, Q.: New identity-based short signature without random oracles. Procedia Eng. 15, 3445\u20133449 (2011)","journal-title":"Procedia Eng."},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Cha, J.C., Cheon, J.H.: An identity-based signature from gap diffie-hellman groups. In: International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography, pp. 18\u201330. Springer (2003)","DOI":"10.1007\/3-540-36288-6_2"},{"key":"43_CR11","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"Florian Hess","year":"2003","unstructured":"Hess, F.: Efficient identity based signature schemes based on pairings. In: Selected Areas in Cryptography, pp. 310\u2013324. Springer, Heidelberg (2002)"},{"key":"43_CR12","unstructured":"Paterson, K.G., Schuldt, J.C.N.: Efficient identity-based signatures secure in the standard model. Lecture Notes in Computer Science, p. 80 (2006). http:\/\/www.rsc.org\/dose\/titleofsubordinatedocument . Cited 15 Jan 1999"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broadband and Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02613-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:40:01Z","timestamp":1775248801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02613-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,19]]},"ISBN":["9783030026127","9783030026134"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02613-4_43","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,19]]},"assertion":[{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}