{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:50:42Z","timestamp":1743108642700,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030939557"},{"type":"electronic","value":"9783030939564"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-93956-4_1","type":"book-chapter","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T08:03:00Z","timestamp":1641974580000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Practical and Provable Secure Vehicular Component Protection Scheme"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6460-5944","authenticated-orcid":false,"given":"Jixin","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9033-2575","authenticated-orcid":false,"given":"Jiageng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,12]]},"reference":[{"issue":"5","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2015","unstructured":"Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21(5), 1733\u20131743 (2015). https:\/\/doi.org\/10.1007\/s11276-014-0881-0","journal-title":"Wirel. Netw."},{"issue":"10","key":"1_CR2","doi-asserted-by":"publisher","first-page":"4714","DOI":"10.1109\/TIE.2012.2213556","volume":"60","author":"KY Chan","year":"2013","unstructured":"Chan, K.Y., Dillon, T.S., Chang, E.: An intelligent particle swarm optimization for short-term traffic flow forecasting using on-road sensor systems. IEEE Trans. Ind. Electron. 60(10), 4714\u20134725 (2013)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/s00453-013-9754-7","volume":"67","author":"M Cheraghchi","year":"2013","unstructured":"Cheraghchi, M.: Improved constructions for non-adaptive threshold group testing. Algorithmica 67(3), 384\u2013417 (2013). https:\/\/doi.org\/10.1007\/s00453-013-9754-7","journal-title":"Algorithmica"},{"key":"1_CR4","unstructured":"Dan Boneh, V.S.: A graduate course in applied cryptography (2020). https:\/\/crypto.stanford.edu\/~dabo\/cryptobook\/"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Du, D.Z., Hwang, F.K.: Combinatorial Group Testing and Its Applications. Series on Applied Mathematics, 2nd edn, vol. 12. World Scientific (2000)","DOI":"10.1142\/4252"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Guo, H., Yu, F., Zhang, Z., Wong, W., Ma, M., Wu, Y.: HASVC: an efficient hybrid authentication scheme for vehicular communication. In: Proceedings of IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 5\u20139 June 2011, pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/icc.2011.5963010"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Gupta, N., Manaswini, R., Saikrishna, B., da Silva e Silva, F.J., Teles, A.S.: Authentication-based secure data dissemination protocol and framework for 5G-enabled VANET. Future Internet 12(4), 63 (2020). https:\/\/doi.org\/10.3390\/fi12040063","DOI":"10.3390\/fi12040063"},{"issue":"1","key":"1_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/iet-cps.2016.0019","volume":"1","author":"H He","year":"2016","unstructured":"He, H., Yan, J.: Cyber-physical attacks and defences in the smart grid: a survey. IET Cyper-Phys. Syst. Theory Appl. 1(1), 13\u201327 (2016)","journal-title":"IET Cyper-Phys. Syst. Theory Appl."},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-99807-7_22","volume-title":"Information Security Practice and Experience","author":"S Hirose","year":"2018","unstructured":"Hirose, S., Shikata, J.: Non-adaptive group-testing aggregate MAC scheme. In: Su, C., Kikuchi, H. (eds.) ISPEC 2018. LNCS, vol. 11125, pp. 357\u2013372. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99807-7_22"},{"issue":"11","key":"1_CR10","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1109\/TIFS.2013.2277471","volume":"8","author":"S Horng","year":"2013","unstructured":"Horng, S., et al.: b-SPECS+: batch verification for secure pseudonymous authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8(11), 1860\u20131875 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"1_CR11","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/TITS.2017.2712772","volume":"19","author":"HJ Jo","year":"2018","unstructured":"Jo, H.J., Kim, I.S., Lee, D.H.: Reliable cooperative authentication for vehicular networks. IEEE Trans. Intell. Transp. Syst. 19(4), 1065\u20131079 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-540-79263-5_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"J Katz","year":"2008","unstructured":"Katz, J., Lindell, A.Y.: Aggregate message authentication codes. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 155\u2013169. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79263-5_10"},{"issue":"2","key":"1_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MNET.001.1900220","volume":"34","author":"C Lai","year":"2020","unstructured":"Lai, C., Lu, R., Zheng, D., Shen, X.S.: Security and privacy challenges in 5G-enabled vehicular networks. IEEE Netw. 34(2), 37\u201345 (2020)","journal-title":"IEEE Netw."},{"key":"1_CR14","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-981-10-3892-1_5","volume-title":"Secure and Trustworthy Transportation Cyber-Physical Systems","author":"W Li","year":"2017","unstructured":"Li, W., Song, H., Wei, Y., Zeng, F.: Toward more secure and trustworthy transportation cyber-physical systems. In: Sun, Y., Song, H. (eds.) Secure and Trustworthy Transportation Cyber-Physical Systems. SCS, pp. 87\u201397. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-3892-1_5"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.jnca.2018.02.002","volume":"110","author":"D Liao","year":"2018","unstructured":"Liao, D., Li, H., Sun, G., Zhang, M., Chang, V.: Location and trajectory privacy preservation in 5G-enabled vehicle social network services. J. Netw. Comput. Appl. 110, 108\u2013118 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"1_CR16","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442\u20133456 (2007)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"1_CR17","doi-asserted-by":"publisher","first-page":"1266","DOI":"10.1109\/TITS.2013.2258153","volume":"14","author":"N Lu","year":"2013","unstructured":"Lu, N., Zhang, N., Cheng, N., Shen, X., Mark, J.W., Bai, F.: Vehicles meet infrastructure: toward capacity-cost tradeoffs for vehicular access networks. IEEE Trans. Intell. Transp. Syst. 14(3), 1266\u20131277 (2013)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/s11227-016-1785-9","volume":"73","author":"PGV Naranjo","year":"2017","unstructured":"Naranjo, P.G.V., Shojafar, M., Mostafaei, H., Pooranian, Z., Baccarelli, E.: P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks. J. Supercomput. 73(2), 733\u2013755 (2017). https:\/\/doi.org\/10.1007\/s11227-016-1785-9","journal-title":"J. Supercomput."},{"key":"1_CR19","unstructured":"Munich, O.B., Stuttgart, J.D., Munich, J.P.S.: Automotive software and electronics 2030 (2019). https:\/\/www.gsaglobal.org\/wp-content\/uploads\/2019\/07\/McKinsey-Report-with-GSA-Logo.pdf"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"12014","DOI":"10.1109\/ACCESS.2017.2717999","volume":"5","author":"U Rajput","year":"2017","unstructured":"Rajput, U., Abbas, F., Eun, H., Oh, H.: A hybrid approach for efficient privacy-preserving authentication in VANET. IEEE Access 5, 12014\u201312030 (2017)","journal-title":"IEEE Access"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Ram\u00edrez-Reyna, M.A., Cruz-P\u00e9rez, F.A., Castellanos-Lopez, S.L., Hern\u00e1ndez-Valdez, G., Rivero-Angeles, M.E.: Performance analysis of dynamic spectrum leasing strategies in coordinated cognitive radio networks. EURASIP J. Wirel. Commun. Netw. 2018 (2018). Article number: 242. https:\/\/doi.org\/10.1186\/s13638-018-1266-3","DOI":"10.1186\/s13638-018-1266-3"},{"issue":"1","key":"1_CR22","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-030-36938-5_23","volume-title":"Network and System Security","author":"S Sato","year":"2019","unstructured":"Sato, S., Hirose, S., Shikata, J.: Sequential aggregate MACs with detecting functionality revisited. In: Liu, J.K., Huang, X. (eds.) NSS 2019. LNCS, vol. 11928, pp. 387\u2013407. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36938-5_23"},{"issue":"3","key":"1_CR24","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","volume":"65","author":"J Shao","year":"2016","unstructured":"Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711\u20131720 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"7","key":"1_CR25","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589\u20133603 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1_CR26","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-981-10-7398-4_29","volume-title":"Frontier Computing","author":"W-C Wu","year":"2018","unstructured":"Wu, W.-C., Liaw, H.-T.: The next generation of Internet of Things: internet of vehicles. In: Hung, J.C., Yen, N.Y., Hui, L. (eds.) FC 2017. LNEE, vol. 464, pp. 278\u2013282. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-7398-4_29"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-030-23538-3_12","volume-title":"Design, User Experience, and Usability. Application Domains","author":"X Xin","year":"2019","unstructured":"Xin, X., et al.: A literature review of the research on take-over situation in autonomous driving. In: Marcus, A., Wang, W. (eds.) HCII 2019. LNCS, vol. 11585, pp. 160\u2013169. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23538-3_12"},{"issue":"2","key":"1_CR28","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/JSEN.2014.2359014","volume":"15","author":"B Yang","year":"2014","unstructured":"Yang, B., Lei, Y.: Vehicle detection and classification for low-speed congested traffic with anisotropic magnetoresistive sensor. IEEE Sens. J. 15(2), 1132\u20131138 (2014)","journal-title":"IEEE Sens. J."},{"issue":"2","key":"1_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41650-017-0018-6","volume":"2","author":"F Yang","year":"2017","unstructured":"Yang, F., Li, J., Lei, T., Wang, S.: Architecture and key technologies for Internet of Vehicles: a survey. J. Commun. Inf. Netw. 2(2), 1\u201317 (2017)","journal-title":"J. Commun. Inf. Netw."}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93956-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T04:27:49Z","timestamp":1651811269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93956-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030939557","9783030939564"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93956-4_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"12 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}