{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:03:00Z","timestamp":1762956180103,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030343521"},{"type":"electronic","value":"9783030343538"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34353-8_4","type":"book-chapter","created":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T16:03:22Z","timestamp":1574957002000},"page":"52-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks"],"prefix":"10.1007","author":[{"given":"Liming","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiajun","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Patterson","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Doss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu, F., Wu, Z., Wang, F.-Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985\u20132996 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","volume":"37","author":"S Al-Sultan","year":"2014","unstructured":"Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular ad hoc network. J. Netw. Comput. Appl. 37, 380\u20133923 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TITS.2011.2164068","volume":"13","author":"R Lu","year":"2012","unstructured":"Lu, R., Lin, X., Liang, X., Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Trans. Intell. Transp. Syst. 13(1), 127\u2013139 (2012)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1016\/j.compeleceng.2011.11.009","volume":"38","author":"H Xiong","year":"2012","unstructured":"Xiong, H., Chen, Z., Li, F.: Efficient and multi-level privacy-preserving communication protocol for VANET. Comput. Electr. Eng. 38(3), 573\u2013581 (2012)","journal-title":"Comput. Electr. Eng."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Raya, M, Aziz, A, Hubaux, J.P.: Efficient secure aggregation in VANETs. In: Proceedings of International Workshop on Vehicular Ad Hoc Networks, New York, pp. 67\u201375 (2006)","DOI":"10.1145\/1161064.1161076"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.adhoc.2010.05.005","volume":"9","author":"TW Chim","year":"2011","unstructured":"Chim, T.W., Yiu, S.M., Lucas, C.K., et al.: SPECS: secure and privacy enhancing communications schemes for VANETs. Ad Hoc Netw. 9, 189\u2013203 (2011)","journal-title":"Ad Hoc Netw."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., et al.: An efficient identity based batch verification scheme for vehicular sensor networks. In: The 27th IEEE Conference on Computer Communications, INFOCOM, Phoenix, AZ, pp. 246\u2013250 (2008)","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., et al.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of IEEE INFOCOM, Phoenix, pp. 1229\u20131237 (2008)","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"JH Yang","year":"2009","unstructured":"Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28, 138\u2013143 (2009)","journal-title":"Comput. Secur."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TVT.2010.2089544","volume":"60","author":"JL Huang","year":"2011","unstructured":"Huang, J.L., Yeh, L.Y., Chien, H.Y.: ABAKA: an anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60, 248\u2013262 (2011)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"KA Shim","year":"2012","unstructured":"Shim, K.A.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61, 1874\u20131883 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Lu, R., Lin, X., et al.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59, 3589\u20133603 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"4_CR13","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1016\/j.eswa.2013.10.003","volume":"41","author":"JK Liu","year":"2014","unstructured":"Liu, J.K., Yuen, T.H., Au, M.H., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5), 2559\u20132564 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"4_CR14","doi-asserted-by":"publisher","first-page":"3697","DOI":"10.1109\/TVT.2014.2358633","volume":"64","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Wang, L., Chen, H.-H.: Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 64(8), 3697\u20133710 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., Ho, P.H.: RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In: ICC 2008, IEEE International Conference on Communications, pp. 1451\u20131457. IEEE (2008)","DOI":"10.1109\/ICC.2008.281"},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","volume":"65","author":"J Shao","year":"2016","unstructured":"Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711\u20131720 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"4_CR17","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/JSYST.2012.2231792","volume":"8","author":"M-C Chuang","year":"2014","unstructured":"Chuang, M.-C., Lee, J.-F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749\u2013758 (2014)","journal-title":"IEEE Syst. J."}],"container-title":["Communications in Computer and Information Science","Future Network Systems and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34353-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:51:01Z","timestamp":1709826661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-34353-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030343521","9783030343538"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34353-8_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FNSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Network Systems and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fnss2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fnss.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}