{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:16:07Z","timestamp":1775258167966,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030031916","type":"print"},{"value":"9783030031923","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03192-3_9","type":"book-chapter","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:06:48Z","timestamp":1540508808000},"page":"103-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Privacy Preserving Authentication Scheme in the Intelligent Transportation Systems"],"prefix":"10.1007","author":[{"given":"Cuong","family":"Nguyen Hai Vinh","sequence":"first","affiliation":[]},{"given":"Anh","family":"Truong","sequence":"additional","affiliation":[]},{"given":"Tai","family":"Tran Huu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.cose.2016.04.006","volume":"60","author":"V Sucasas","year":"2016","unstructured":"Sucasas, V., Mantas, G., Saghezchi, F.B., Radwan, A., Rodriguez, J.: An autonomous privacy preserving authentication scheme for intelligent transportation systems. Comput. Secur. 60, 193\u2013205 (2016)","journal-title":"Comput. Secur."},{"key":"9_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-158-9","volume-title":"Vehicular Ad-hoc Networks for Smart Cities","author":"MNM Saad","year":"2014","unstructured":"Saad, M.N.M., Laouiti, A., Qayyum, A.: Vehicular Ad-hoc Networks for Smart Cities. Springer, Singapore (2014). https:\/\/doi.org\/10.1007\/978-981-287-158-9"},{"key":"9_CR3","doi-asserted-by":"publisher","DOI":"10.1201\/9781420085891","volume-title":"Vehicular Networks: From Theory to Practice","author":"S Olariu","year":"2009","unstructured":"Olariu, S., Weigle, M.C.: Vehicular Networks: From Theory to Practice, 1st edn. Chapman & Hall\/CRC, Boca Raton (2009)","edition":"1"},{"issue":"3","key":"9_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/S1007-0214(06)70198-5","volume":"11","author":"Z Juan","year":"2006","unstructured":"Juan, Z., Jianping, W., McDonald, M.: Socio-economic impact assessment of intelligent transport systems. Tsinghua Sci. Technol. 11(3), 339\u2013350 (2006)","journal-title":"Tsinghua Sci. Technol."},{"key":"9_CR5","volume-title":"Economic Impacts of Intelligent Transportation Systems","author":"E Bekiaris","year":"2004","unstructured":"Bekiaris, E., Nakanishi, Y.J.: Economic Impacts of Intelligent Transportation Systems. Elsevier, Amsterdam (2004)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Raya, M., Hubaux, J.-P.: The security of vehicular ad-hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad-Hoc and Sensor Networks, SASN 2005, pp. 11\u201321. ACM, New York (2005)","DOI":"10.1145\/1102219.1102223"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Liu, X., Fang, Z., Shi, L.: Securing vehicular ad hoc networks. In: 2nd International Conference on Pervasive Computing and Applications, ICPCA 2007, pp. 424\u2013429, July 2007","DOI":"10.1109\/ICPCA.2007.4365481"},{"issue":"6","key":"9_CR8","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442\u20133456 (2007)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: The 27th Conference on Computer Communications, INFOCOM 2008. IEEE, April 2008","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2007, pp. 19\u201328. ACM, New York (2007)","DOI":"10.1145\/1287748.1287752"},{"issue":"8","key":"9_CR11","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","volume":"25","author":"K Sampigethaya","year":"2007","unstructured":"Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569\u20131589 (2007)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"9_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIS.2013.56","volume":"28","author":"R Lu","year":"2013","unstructured":"Lu, R., Lin, X., Shi, Z., Shen, X.: A lightweight conditional privacy-preservation protocol for vehicular traffic-monitoring systems. Intelligent Systems, IEEE 28(3), 62\u201365 (2013)","journal-title":"Intelligent Systems, IEEE"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Sucasas, V., Radwan, A., Marques, H., Rodriguez, J., Vahid, S., Tafazolli, R.: A cognitive approach for stable cooperative-group formation in mobile environments. In: 2014 IEEE International Conference on Communications (ICC), pp. 3241\u20133245, June 2014","DOI":"10.1109\/ICC.2014.6883820"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Ma, Z., Kargl, F., Weber, M.: Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications. In: IEEE 68th Vehicular Technology Conference, VTC 2008-Fall, pp. 1\u20135, September 2008","DOI":"10.1109\/VETECF.2008.455"},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TVT.2010.2089544","volume":"60","author":"J-L Huang","year":"2011","unstructured":"Huang, J.-L., Yeh, L.-Y., Chien, Hung-Yu.: ABAKA: an anonymous batch authenticated and key agreement scheme for value added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1), 248\u2013262 (2011)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"9_CR16","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TITS.2011.2156790","volume":"12","author":"D Huang","year":"2011","unstructured":"Huang, D., Misra, S., Verma, M., Xue, G.: PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 736\u2013746 (2011)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"7","key":"9_CR17","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Lu, R., Lin, X., Shen, X., Jinshu, S.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589\u20133603 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Haas, J.J., Hu, Y.-C., Laberteaux, K.P.: Design and analysis of a lightweight certificate revocation mechanism for VANET. In: Proceedings of the 6th ACM International Workshop on VehiculAr InterNETworking, VANET 2009, pp. 89\u201398. ACM, New York (2009)","DOI":"10.1145\/1614269.1614285"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference, vol. 2, pp. 1187\u20131192, March 2005","DOI":"10.1109\/WCNC.2005.1424677"},{"issue":"8","key":"9_CR20","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/LCOMM.2013.070113.122816","volume":"17","author":"B Ying","year":"2013","unstructured":"Ying, B., Makrakis, D., Mouftah, H.T.: Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun. Lett. 17(8), 1524\u20131527 (2013)","journal-title":"IEEE Commun. Lett."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of International Conference on Pervasive Services, ICPS 2005, pp. 88\u201397, July 2005","DOI":"10.1109\/ICDE.2005.269"},{"issue":"5","key":"9_CR22","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/MCOM.2013.6515060","volume":"51","author":"G Araniti","year":"2013","unstructured":"Araniti, G., Campolo, C., Condoluci, M., Iera, A., Molinaro, A.: Lte for vehicular networking: a survey. IEEE Commun. Mag. 51(5), 148\u2013157 (2013)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"9_CR23","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/TSC.2010.9","volume":"4","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Chen, J.-L.: A delegation solution for universal identity management in SOA. IEEE Trans. Serv. Comput. 4(1), 70\u201381 (2011)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9_CR24","unstructured":"Zhou, X., Tang, X.: Research and implementation of RSA algorithm for encryption and decryption. IEEE, September 2011"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03192-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:53:08Z","timestamp":1775253188000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03192-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030031916","9783030031923"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03192-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"27 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cse.hcmut.edu.vn\/fdse2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}