{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:13Z","timestamp":1726003093856},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_16","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T14:07:56Z","timestamp":1544191676000},"page":"192-202","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Application of Sensor-Cloud Systems: Smart Traffic Control"],"prefix":"10.1007","author":[{"given":"Chaogang","family":"Tang","sequence":"first","affiliation":[]},{"given":"Xianglin","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.031","author":"T Wang","year":"2017","unstructured":"Wang, T., Zeng, J., Lai, Y., Tian, H., Chen, Y.: Data collection from WSNs to the cloud based on mobile Fog elements. Fut. Gener. Comput. Syst. (2017). \nhttps:\/\/doi.org\/10.1016\/j.future.2017.07.031","journal-title":"Fut. Gener. Comput. Syst."},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.future.2017.12.036","volume":"83","author":"T Wang","year":"2018","unstructured":"Wang, T., Zhou, J., Huang, M., Bhuiyan, M., Liu, A.: Fog-based storage technology to fight with cyber threat. Future Generation Computer Systems 83, 208\u2013218 (2018)","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"16_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2018.1700592","volume":"56","author":"C Zhu","year":"2018","unstructured":"Zhu, C., Rodrigues, J.J.P.C., Leung, V.C.M., Shu, L., Yang, L.T.: Trust-based communication for the industrial internet of things. IEEE Commun. Mag. 56(2), 16\u201322 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"16_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.049","author":"T Wang","year":"2018","unstructured":"Wang, T., Zhang, G., Bhuiyan, Z.A., Liu, A., Jia, W., Xie, M.: A novel trust mechanism based on fog computing in sensor-cloud system. Fut. Gener. Comput. Syst. (2018). \nhttps:\/\/doi.org\/10.1016\/j.future.2018.05.049","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"12","key":"16_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2017.1700212","volume":"55","author":"C Zhu","year":"2017","unstructured":"Zhu, C., Shu, L., Leung, V.C.M., Guo, S., Zhang, Y., Yang, L.T.: Secure multimedia big data in trust-assisted sensor-cloud for smart city. IEEE Commun. Mag. 55(12), 24\u201330 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-319-27293-1_34","volume-title":"Internet of Vehicles - Safe and Intelligent Mobility","author":"Biao Zhao","year":"2015","unstructured":"Zhao, B., Zhang, C., Zhang, L.: Real-Time Traffic Light Scheduling Algorithm Based on Genetic Algorithm and Machine Learning (2015)"},{"key":"16_CR7","unstructured":"Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: Sumo-simulation of urban mobility: an overview. In: Simul (simul 2011), pp. 63\u201368 (2011)"},{"key":"16_CR8","unstructured":"Krajzewicz, D., et al.: Simulation of modern traffic lights control systems using the open source traffic simulation sumo. In: Industrial Simulation Conference, pp. 299\u2013302 (2005)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Maslekar, N., Boussedjra, M., Mouzna, J., Labiod, H.: Vanet based adaptive traffic signal control. In: Vehicular Technology Conference, pp. 1\u20135 (2011)","DOI":"10.1109\/VETECS.2011.5956305"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Priemer, C., Friedrich, B.: A decentralized adaptive traffic signal control using v2i communication data. In: International IEEE Conference on Intelligent Transportation Systems, pp. 1\u20136 (2009)","DOI":"10.1109\/ITSC.2009.5309870"},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.trc.2015.01.007","volume":"55","author":"Y Feng","year":"2015","unstructured":"Feng, Y., Head, K.L., Khoshmagham, S., Zamanipour, M.: A real-time adaptive signal control in a connected vehicle environment. Transp. Res. Part C 55, 460\u2013473 (2015)","journal-title":"Transp. Res. Part C"},{"issue":"6","key":"16_CR12","doi-asserted-by":"publisher","first-page":"3860","DOI":"10.1109\/TVT.2016.2532863","volume":"65","author":"X Hou","year":"2016","unstructured":"Hou, X., Li, Y., Chen, M., Wu, D., Jin, D., Chen, S.: Vehicular fog computing: a viewpoint of vehicles as the infrastructures. IEEE Trans. Veh. Technol. 65(6), 3860\u20133873 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"16_CR13","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/S1005-8885(16)60021-3","volume":"23","author":"K Kang","year":"2016","unstructured":"Kang, K., Wang, C., Luo, T.: Fog computing for vehicular adhoc networks: paradigms, scenarios, and issues. J. China Univ. Posts Telecommun. 23(2), 56\u201365 (2016)","journal-title":"J. China Univ. Posts Telecommun."},{"issue":"11","key":"16_CR14","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/MCOM.2017.1700322","volume":"55","author":"C Huang","year":"2017","unstructured":"Huang, C., Lu, R., Choo, K.K.R.: Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun. Mag. 55(11), 105\u2013111 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"16_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2017.2649525","author":"C Zhu","year":"2017","unstructured":"Zhu, C., Li, X., Leung, V.C.M., Yang, L.T., Ngai, E.C.-H., Shu, L.: Towards pricing for sensor-cloud. IEEE Trans. Cloud Comput. (2017). \nhttps:\/\/doi.org\/10.1109\/tcc.2017.2649525","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"5","key":"16_CR16","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/MCOM.2017.1600822","volume":"55","author":"C Zhu","year":"2017","unstructured":"Zhu, C., Leung, V.C.M., Wang, K., Yang, L.T., Zhang, Y.: Multi-method data delivery for green sensor-cloud. IEEE Commun. Mag. 55(5), 176\u2013182 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"11","key":"16_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCOM.2017.1700142","volume":"55","author":"C Zhu","year":"2017","unstructured":"Zhu, C., Zhou, H., Leung, V.C.M., Wang, K., Zhang, Y., Yang, L.T.: Toward big data in Green City. IEEE Commun. Mag. 55(11), 14\u201318 (2017)","journal-title":"IEEE Commun. Mag."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T14:16:32Z","timestamp":1544192192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}