{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:28:21Z","timestamp":1742966901865,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031088186"},{"type":"electronic","value":"9783031088193"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08819-3_8","type":"book-chapter","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T04:02:45Z","timestamp":1655265765000},"page":"75-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Anonymous Authentication Scheme Based on\u00a0Self-generated Pseudonym for\u00a0VANETs"],"prefix":"10.1007","author":[{"given":"Jiayu","family":"Qi","sequence":"first","affiliation":[]},{"given":"Tianhan","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"issue":"6","key":"8_CR1","doi-asserted-by":"publisher","first-page":"2958","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu, F., Wu, Z., Wang, F., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2958\u20132996 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-015-0054-x","volume":"5","author":"JK Lee","year":"2015","unstructured":"Lee, J.K., Jeong, Y.S., Park, J.H.: s-ITSF: a service based intelligent transportation system framework for smart accident management. HCIS 5(1), 1\u20139 (2015). https:\/\/doi.org\/10.1186\/s13673-015-0054-x","journal-title":"HCIS"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1109\/TIFS.2020.3040876","volume":"16","author":"L Wei","year":"2021","unstructured":"Wei, L., Cui, J., Xu, Y., Cheng, J., Zhong, H.: Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs. IEEE Trans. Inf. Forensics Secur. 16, 1681\u20131695 (2021). https:\/\/doi.org\/10.1109\/TIFS.2020.3040876","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"8_CR4","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2014","unstructured":"Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for VANETs with batch verification. Wireless Netw. 21(5), 1733\u20131743 (2014). https:\/\/doi.org\/10.1007\/s11276-014-0881-0","journal-title":"Wireless Netw."},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/5129620","volume":"2020","author":"MS Sheikh","year":"2020","unstructured":"Sheikh, M.S., Liang, J., Wang, W.: Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey. Wirel. Commun. Mob. Comput. 2020(3), 1\u201325 (2020)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Manivannan, D., Moni, S.S., Zeadally, S.: Secure authentication and privacy preserving techniques in Vehicular Ad hoc Network(VANETs). Vehicular Commun. 25. 100247. https:\/\/doi.org\/10.1016\/j.vehcom.2020.100247","DOI":"10.1016\/j.vehcom.2020.100247"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Malhi, A.K., Batra, S., Pannu, H.S.: Security of vehicular ad hoc networks: a comprehensive survey. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2019.101664","DOI":"10.1016\/j.cose.2019.101664"},{"issue":"9","key":"8_CR8","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees, M., Vijayakumar, P., Deboarh, L.J.: EAAP: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 18(9), 2467\u20132476 (2017). https:\/\/doi.org\/10.1109\/TITS.2016.2634623","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"6","key":"8_CR9","doi-asserted-by":"publisher","first-page":"3076","DOI":"10.1007\/s11227-018-2312-y","volume":"75","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Kumari, S., Sharma, V., Li, X., Sangaiah, A.K., Islam, S.K.H.: Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. 75(6), 3076\u20133098 (2018). https:\/\/doi.org\/10.1007\/s11227-018-2312-y","journal-title":"J. Supercomput."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2018.10.021","volume":"476","author":"H Zhong","year":"2019","unstructured":"Zhong, H., Han, S., Cui, J., et al.: Privacy preserving authentication scheme with full aggregation in VANET. Inf. Sci. 476, 211\u2013221 (2019)","journal-title":"Inf. Sci."},{"issue":"4","key":"8_CR11","doi-asserted-by":"publisher","first-page":"5373","DOI":"10.1109\/JSYST.2020.2977670","volume":"14","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Zhong, H., Xu, Y., et al.: Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for VANETs. IEEE Syst. J. 14(4), 5373\u20135383 (2020)","journal-title":"IEEE Syst. J."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.comcom.2017.09.005","volume":"112","author":"S Wang","year":"2017","unstructured":"Wang, S., Yao, N.: LIAP: a local identity-based anonymous message authentication protocol in VANETs. Comput. Commun. 112, 154\u2013164 (2017)","journal-title":"Comput. Commun."},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-030-02744-5_22","volume-title":"Network and System Security","author":"J Liu","year":"2018","unstructured":"Liu, J., Yu, Y., Zhao, Y., Jia, J., Wang, S.: An efficient privacy preserving batch authentication scheme with deterable function for VANETs. In: Au, M.H., et al. (eds.) NSS 2018. LNCS, vol. 11058, pp. 288\u2013303. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02744-5_22"},{"key":"8_CR14","first-page":"15","volume":"14","author":"J Cui","year":"2018","unstructured":"Cui, J., Tao, X., Zhang, J., et al.: HCPA-GKA: a hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs. Veh. Commun. 14, 15\u201325 (2018)","journal-title":"Veh. Commun."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Liu, F., Wang, Q.: IBRS: an efficient identity-based batch verification scheme for VANETs based on ring signature. arXiv preprint arXiv:1909.13223 (2019)","DOI":"10.1109\/VNC48660.2019.9062800"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Sun, M., Guo, Y., Zhang, D., et al.: Anonymous authentication and key agreement scheme combining the group key for vehicular ad hoc networks. Complexity (2021)","DOI":"10.1155\/2021\/5526412"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08819-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T04:04:21Z","timestamp":1655265861000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08819-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031088186","9783031088193"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08819-3_8","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}