{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:52:17Z","timestamp":1773773537734,"version":"3.50.1"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031088186","type":"print"},{"value":"9783031088193","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08819-3_7","type":"book-chapter","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T04:02:45Z","timestamp":1655265765000},"page":"65-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Secure Data Sharing Scheme Based on\u00a0CP-ABE in\u00a0VANETs"],"prefix":"10.1007","author":[{"given":"Xinyang","family":"Deng","sequence":"first","affiliation":[]},{"given":"Tianhan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Kang","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"7_CR1","volume":"34","author":"A Mchergui","year":"2022","unstructured":"Mchergui, A., Moulahi, T., Zeadally, S.: Survey on Artificial Intelligence (AI) techniques for Vehicular Ad-hoc Networks (VANETs). Veh. Commun. 34, 100403 (2022)","journal-title":"Veh. Commun."},{"issue":"6","key":"7_CR2","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu, F., Wu, Z., Wang, F.-Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985\u20132996 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"7_CR3","unstructured":"IEEE Guide for Wireless Access in Vehicular Environments (WAVE) Architecture - Redline. IEEE Std 1609.0-2019 (Revision of IEEE Std 1609.0-2013) - Redline, pp. 1\u2013219, 10 April 2019"},{"issue":"12","key":"7_CR4","doi-asserted-by":"publisher","first-page":"15933","DOI":"10.1109\/TVT.2020.3037804","volume":"69","author":"S-J Horng","year":"2020","unstructured":"Horng, S.-J., Lu, C.-C., Zhou, W.: An identity-based and revocable data-sharing scheme in VANETs. IEEE Trans. Veh. Technol. 69(12), 15933\u201315946 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"7_CR5","first-page":"1","volume":"22","author":"Z Hong","year":"2016","unstructured":"Hong, Z., et al.: Multi-Authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft. Comput. 22(1), 1\u20139 (2016)","journal-title":"Soft. Comput."},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1109\/TIFS.2018.2868162","volume":"14","author":"G Xu","year":"2019","unstructured":"Xu, G., Li, H., Dai, Y., Yang, K., Lin, X.: Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 14(4), 870\u2013885 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Nakamura, N., Niimi, Y., Ishihara, S.: Live VANET CDN: adaptive data dissemination scheme for location-dependent data in VANETs. In: 2013 IEEE Vehicular Networking Conference, pp. 95\u2013102 (2013)","DOI":"10.1109\/VNC.2013.6737595"},{"issue":"6","key":"7_CR8","doi-asserted-by":"publisher","first-page":"5826","DOI":"10.1109\/TVT.2020.2968094","volume":"69","author":"K Fan","year":"2020","unstructured":"Fan, K., et al.: A secure and verifiable data sharing scheme based on blockchain in vehicular social networks. IEEE Trans. Veh. Technol. 69(6), 5826\u20135835 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Bera, R., Bera, J., Sil, S., Dogra, S., Sinha, N.B., Mondal, D.: Dedicated short range communications (DSRC) for intelligent transport system. In: 2006 IFIP International Conference on Wireless and Optical Communications Networks, p. 5 (2006)","DOI":"10.1109\/WOCN.2006.1666607"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy 2008, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TC.2013.200","volume":"64","author":"Z Zhou","year":"2015","unstructured":"Zhou, Z., Huang, D., Wang, Z.: Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126\u2013138 (2015)","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08819-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T04:04:30Z","timestamp":1655265870000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08819-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031088186","9783031088193"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08819-3_7","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}