{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:10:08Z","timestamp":1746331808006,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030940287"},{"type":"electronic","value":"9783030940294"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94029-4_2","type":"book-chapter","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T03:02:48Z","timestamp":1641870168000},"page":"16-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Xia","sequence":"first","affiliation":[]},{"given":"Yifeng","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,11]]},"reference":[{"issue":"5","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2015","unstructured":"Bayat, M., Barmshoory, M., Rahimi, M.: A secure authentication scheme for VANETs with batch verification. Wireless Netw. 21(5), 1733\u20131743 (2015)","journal-title":"Wireless Netw."},{"issue":"8","key":"2_CR2","first-page":"32","volume":"5","author":"X-L Bo","year":"2018","unstructured":"Bo, X.-L.: Analysis of the security mechanism of internet of vehicles communication based on public key cryptography. Internet Things Technol. 5(8), 32\u201334 (2018)","journal-title":"Internet Things Technol."},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-540-40061-5_3","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"E Bresson","year":"2003","unstructured":"Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37\u201354. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_3"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TITS.2021.3139738","volume":"22","author":"B Cao","year":"2021","unstructured":"Cao, B., Sun, Z.-H., Zhang, J.-T.: Resource allocation in 5G IoV architecture based on SDN and fog-cloud computing. IEEE Trans. Intell. Transp. Syst. 22, 1\u20139 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-04904-0_29","volume-title":"Security Protocols","author":"F Hao","year":"2009","unstructured":"Hao, F.: A 2-round anonymous veto protocol. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2006. LNCS, vol. 5087, pp. 212\u2013214. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04904-0_29"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/3-540-39200-9_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"C Gentry","year":"2003","unstructured":"Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272\u2013293. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_17"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1360\/jos181007","volume":"18","author":"C-X Gu","year":"2007","unstructured":"Gu, C.-X., Zhu, Y.-F., Pan, X.-Y.: Forking lemma and the security proofs for a class of ID-based signatures. J. Softw. 18(4), 1007\u20131014 (2007)","journal-title":"J. Softw."},{"issue":"12","key":"2_CR8","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D-B He","year":"2015","unstructured":"He, D.-B., Zeadally, S., Xu, B.-W.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"2_CR9","first-page":"48","volume":"317","author":"S-J Horng","year":"2015","unstructured":"Horng, S.-J., Tzeng, S.-F., Huang, P.-H., Wang, X.-M.: An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf. Sci. Int. J. 317(3), 48\u201366 (2015)","journal-title":"Inf. Sci. Int. J."},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.tcs.2016.12.017","volume":"662","author":"J-Y Hwang","year":"2016","unstructured":"Hwang, J.-Y., Song, B., Choi, D.: Simplified small exponent test for batch verification. Theoret. Comput. Sci. 662, 48\u201358 (2016)","journal-title":"Theoret. Comput. Sci."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Kamat, P., Baliga, A., Wade, T.: An identity-based security framework for VANETs. In: International Workshop on Vehicular Ad Hoc Networks. ACM (2006)","DOI":"10.1145\/1161064.1161083"},{"issue":"1","key":"2_CR12","first-page":"104","volume":"13","author":"J-L Li","year":"2018","unstructured":"Li, J.-L., Choo, K.-K.-R., Zhang, W.-G.: EPA-CPPA: an efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13(1), 104\u2013113 (2018)","journal-title":"Veh. Commun."},{"issue":"2","key":"2_CR13","first-page":"58","volume":"47","author":"H Liu","year":"2013","unstructured":"Liu, H., Li, H.: A distributed authentication protocol for VANET. J. Xi\u2019an Jiaotong Univ. 47(2), 58\u201362 (2013)","journal-title":"J. Xi\u2019an Jiaotong Univ."},{"issue":"1","key":"2_CR14","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R.-X. Lu","year":"2012","unstructured":"Lu, R..-X.., Lin, X.-D., Luan, T.-H.: Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86\u201396 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Lu, R.-X., Lin, X.-D., Zhu, H.-J.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: INFOCOM the Conference on Computer Communications IEEE. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Ng, J.-S., Lim, W.-Y.-B., Dai, H.-N.: Communication-efficient federated learning in UAV-enabled IOV: a joint auction-coalition approach. In: GLOBECOM 2020\u20132020 IEEE Global Communications Conference. IEEE (2020)","DOI":"10.1109\/GLOBECOM42002.2020.9322584"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Palanisamy, B., Liu, L.: MobiMix: protecting location privacy with mix-zones over road networks. In: Proceedings of the 27th International Conference on Data Engineering, ICDE 2011, Hannover, Germany, 11\u201316 April 2011. IEEE (2011)","DOI":"10.1109\/ICDE.2011.5767898"},{"issue":"1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Jean-Pierre, H.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"issue":"3","key":"2_CR19","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","volume":"65","author":"J Shao","year":"2015","unstructured":"Shao, J., Lin, X.-D., Lu, R.-X.: A threshold anonymous authentication protocol for VANETs. IEEE Trans. Veh. Technol. 65(3), 1711\u20131720 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"K-A Shim","year":"2012","unstructured":"Shim, K.-A.: CAPS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874\u20131883 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Wang, M., Wu, J., Li, G.-L.: Toward mobility support for information-centric IoV in smart city using fog computing. In: 2017 IEEE International Conference on Smart Energy Grid Engineering (SEGE). IEEE (2017)","DOI":"10.1109\/SEGE.2017.8052825"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G-W Xu","year":"2019","unstructured":"Xu, G.-W., Li, H.-W., Liu, S.: VerifyNet: secure and verifiable federated learning. IEEE Trans. Inf. Forensics Secur. 15, 911\u2013926 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"2_CR23","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TDSC.2015.2399291","volume":"13","author":"Yu Rong","year":"2016","unstructured":"Rong, Yu., Kang, J.-W., Huang, X.-M.: MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans. Dependable Secure Comput. 13(1), 93\u2013105 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"2_CR24","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TDSC.2019.2904274","volume":"18","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Cui, J., Zhong, H.: PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans. Dependable Secure Comput. 18(2), 722\u2013735 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2_CR25","unstructured":"Zhang, Z.-H., Li, Q.-D., Fu, Y.: Adaptive federated deep learning with non-IID data. Acta Automatica Sinica, 1\u201313 (2021)"},{"issue":"11","key":"2_CR26","doi-asserted-by":"publisher","first-page":"10782","DOI":"10.1109\/JIOT.2020.2987958","volume":"7","author":"C-Y Zhou","year":"2020","unstructured":"Zhou, C.-Y., Fu, A.-M., Shui, Yu.: Privacy-preserving federated learning in fog computing. IEEE Internet Things J. 7(11), 10782\u201310793 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"2_CR27","first-page":"3811","volume":"28","author":"C-S Zhu","year":"2011","unstructured":"Zhu, C.-S., Liu, P.-H., Wang, Q.-R.: Group key management scheme based on group signature with fault tolerance for mobile ad hoc networks. Appl. Res. Comput. 28(10), 3811\u20133816 (2011)","journal-title":"Appl. Res. Comput."}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94029-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T12:31:14Z","timestamp":1651235474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94029-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030940287","9783030940294"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94029-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/css2021.compute.dtu.dk\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}