{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T22:55:11Z","timestamp":1776725711800,"version":"3.51.2"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030053444","type":"print"},{"value":"9783030053451","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_4","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"46-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["SDN-Based Secure VANETs Communication with Fog Computing"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Arif","sequence":"first","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"245","DOI":"10.14257\/ijdta.2015.8.1.25","volume":"8","author":"M Arif","year":"2015","unstructured":"Arif, M., Alam, K.A., Hussain, M.: Application of data mining using artificial neural network: survey. Int. J. Database Theory Appl. 8(1), 245\u2013270 (2015)","journal-title":"Int. J. Database Theory Appl."},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"279","DOI":"10.14257\/ijgdc.2015.8.1.26","volume":"8","author":"M Arif","year":"2015","unstructured":"Arif, M., Mahmood, T.: Cloud computing and its environmental effects. Int. J. Grid Distrib. Comput. 8(1), 279\u2013286 (2015)","journal-title":"Int. J. Grid Distrib. Comput."},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.14257\/ijhit.2015.8.2.22","volume":"8","author":"M Arif","year":"2015","unstructured":"Arif, M., Shakeel, H.: Virtualization security: analysis and open challenges. Int. J. Hybrid Inf. Technol. 8(2), 237\u2013246 (2015)","journal-title":"Int. J. Hybrid Inf. Technol."},{"issue":"2","key":"4_CR4","doi-asserted-by":"crossref","first-page":"235","DOI":"10.24846\/v27i2y201811","volume":"27","author":"M Arif","year":"2018","unstructured":"Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235\u2013246 (2018)","journal-title":"Stud. Inform. Control"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: Proceedings of IEEE 16th International Conference on Dependable, Autonomic and Secure Computer, 16th International Conference on Pervasive Intelligence and Computer, 4th International Conference on Big Data Intelligence and Computer, and 3rd Cyber Science and Technology Congress, pp. 681\u2013688. IEEE, August 2018","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00120"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Arif, M., Wang, G., Peng, T.: Track me if you can? query based dual location privacy in VANETs for V2V and V2I. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 1091\u20131096. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00152"},{"key":"4_CR7","series-title":"Computer Communications and Networks","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-76669-0_5","volume-title":"Smart Cities","author":"A Ghosal","year":"2018","unstructured":"Ghosal, A., Halder, S.: Building intelligent systems for smart cities: issues, challenges and approaches. In: Mahmood, Z. (ed.) Smart Cities. CCN, pp. 107\u2013125. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76669-0_5"},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1212","DOI":"10.3390\/s18041212","volume":"18","author":"J Guerrero-Ib\u00e1\u00f1ez","year":"2018","unstructured":"Guerrero-Ib\u00e1\u00f1ez, J., Zeadally, S., Contreras-Castillo, J.: Sensor technologies for intelligent transportation systems. Sensors 18(4), 1212 (2018)","journal-title":"Sensors"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Klingler, F., Cohen, R., Sommer, C., Dressler, F.: Bloom hopping: bloom filter based 2-hop neighbor management in VANETs. IEEE Trans. Mob. Comput., 1 (2018)","DOI":"10.1109\/TMC.2018.2840123"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MNET.2018.8370870","volume":"32","author":"H Li","year":"2018","unstructured":"Li, H., Lu, R., Misic, J., Mahmoud, M.: Security and privacy of connected vehicular cloud computing. IEEE Netw. 32(3), 4\u20136 (2018)","journal-title":"IEEE Netw."},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"2362","DOI":"10.1109\/TITS.2018.2810708","volume":"19","author":"AK Ligo","year":"2018","unstructured":"Ligo, A.K., Peha, J.M.: Cost-effectiveness of sharing roadside infrastructure for internet of vehicles. IEEE Trans. Intell. Transp. Syst. 19, 2362\u20132372 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.compeleceng.2016.10.005","volume":"59","author":"Q Liu","year":"2017","unstructured":"Liu, Q., Wang, G., Liu, X., Peng, T., Wu, J.: Achieving reliable and secure services in cloud computing environments. Comput. Electr. Eng. 59, 153\u2013164 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.comnet.2018.01.043","volume":"134","author":"AT Naman","year":"2018","unstructured":"Naman, A.T., Wang, Y., Gharakheili, H.H., Sivaraman, V., Taubman, D.: Responsive high throughput congestion control for interactive applications over sdn-enabled networks. Comput. Netw. 134, 152\u2013166 (2018)","journal-title":"Comput. Netw."},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.adhoc.2018.07.016","volume":"82","author":"J Nobre","year":"2018","unstructured":"Nobre, J., et al.: Vehicular software-defined networking and fog computing: integration and design principles. Ad Hoc Netw. 82, 172\u2013181 (2018)","journal-title":"Ad Hoc Netw."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Peng, S., Wang, G., Zhou, Y., Wan, C., Wang, C., Yu, S.: An immunization framework for social networks through big data based influence modeling. IEEE Trans. Dependable Secure Comput. (2017)","DOI":"10.1109\/TDSC.2017.2731844"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.ins.2016.08.010","volume":"387","author":"T Peng","year":"2017","unstructured":"Peng, T., Liu, Q., Meng, D., Wang, G.: Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387, 165\u2013179 (2017)","journal-title":"Inf. Sci."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.future.2017.02.014","volume":"78","author":"AM Rahmani","year":"2018","unstructured":"Rahmani, A.M., et al.: Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener. Comput. Syst. 78, 641\u2013658 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Rego, A., Garcia, L., Sendra, S., Lloret, J.: Software defined networks for traffic management in emergency situations. In: 2018 Fifth International Conference on Software Defined Systems (SDS), pp. 45\u201351. IEEE (2018)","DOI":"10.1109\/SDS.2018.8370421"},{"key":"4_CR19","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-981-10-5547-8_34","volume-title":"Smart Computing and Informatics","author":"GD Singh","year":"2018","unstructured":"Singh, G.D., Tomar, R., Sastry, H.G., Prateek, M.: A review on VANET routing protocols and wireless standards. In: Satapathy, S.C., Bhateja, V., Das, S. (eds.) Smart Computing and Informatics. SIST, vol. 78, pp. 329\u2013340. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-5547-8_34"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"e11","DOI":"10.1002\/spy2.11","volume":"1","author":"A Teniou","year":"2018","unstructured":"Teniou, A., Bensaber, B.A.: Efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks. Secur. Priv. 1(1), e11 (2018)","journal-title":"Secur. Priv."},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Truong, N.B., Lee, G.M., Ghamri-Doudane, Y.: Software defined networking-based vehicular adhoc network with fog computing. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 1202\u20131207. IEEE (2015)","DOI":"10.1109\/INM.2015.7140467"},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1016\/j.future.2017.05.050","volume":"86","author":"F Wang","year":"2018","unstructured":"Wang, F., Jiang, W., Li, X., Wang, G.: Maximizing positive influence spread in online social networks via fluid dynamics. Future Gener. Comput. Syst. 86, 1491\u20131502 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Wang, T., et al.: Data collection from WSNs to the cloud based on mobile fog elements. Future Gener. Comput. Syst. (2017, in press). https:\/\/doi.org\/10.1016\/j.future.2017.07.031","DOI":"10.1016\/j.future.2017.07.031"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Wang, T., Zhang, G., Bhuiyan, M.Z.A., Liu, A., Jia, W., Xie, M.: A novel trust mechanism based on fog computing in sensor-cloud system. Future Gener. Comput. Syst. (2018, in press). https:\/\/doi.org\/10.1016\/j.future.2018.05.049","DOI":"10.1016\/j.future.2018.05.049"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.future.2017.12.036","volume":"83","author":"T Wang","year":"2018","unstructured":"Wang, T., et al.: Fog-based storage technology to fight with cyber threat. Future Gener. Comput. Syst. 83, 208\u2013218 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"4_CR26","first-page":"117","volume":"23","author":"X Xing","year":"2014","unstructured":"Xing, X., Wang, G., Li, J.: Collaborative target tracking in wireless sensor networks. Adhoc Sens. Wirel. Netw. 23, 117\u2013135 (2014)","journal-title":"Adhoc Sens. Wirel. Netw."},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, pp. 37\u201342. ACM (2015)","DOI":"10.1145\/2757384.2757397"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"31541","DOI":"10.1109\/ACCESS.2018.2845468","volume":"6","author":"Q Zhang","year":"2018","unstructured":"Zhang, Q., Liu, Q., Wang, G.: PRMS: a personalized mobile search over encrypted outsourced data. IEEE Access 6, 31541\u201331552 (2018)","journal-title":"IEEE Access"},{"key":"4_CR29","doi-asserted-by":"crossref","first-page":"4191","DOI":"10.1109\/JIOT.2018.2842470","volume":"5","author":"S Zhang","year":"2018","unstructured":"Zhang, S., Wang, G., Bhuiyan, M.Z.A., Liu, Q.: A dual privacy preserving scheme in continuous location-based services. IEEE Internet of Things J. 5, 4191\u20134200 (2018)","journal-title":"IEEE Internet of Things J."},{"issue":"3","key":"4_CR30","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/JIOT.2015.2497712","volume":"3","author":"Z Zhou","year":"2016","unstructured":"Zhou, Z., Dong, M., Ota, K., Wang, G., Yang, L.T.: Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks. IEEE Internet of Things J. 3(3), 428\u2013438 (2016)","journal-title":"IEEE Internet of Things J."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T20:00:19Z","timestamp":1573070419000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}