{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T18:26:30Z","timestamp":1769019990577,"version":"3.49.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319111667","type":"print"},{"value":"9783319111674","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11167-4_22","type":"book-chapter","created":{"date-parts":[[2014,8,11]],"date-time":"2014-08-11T02:28:52Z","timestamp":1407724132000},"page":"218-226","source":"Crossref","is-referenced-by-count":8,"title":["SCHAP: The Aggregate SignCryption Based Hybrid Authentication Protocol for VANET"],"prefix":"10.1007","author":[{"given":"Yiliang","family":"Han","sequence":"first","affiliation":[]},{"given":"Dingyi","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Zelun","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Status of Project IEEE 802.11 Task Group p: Wireless Access in Vehicular Environments. IEEE 2004-2010, \n                    \n                      http:\/\/grouper.ieee.org\/groups\/802\/11\/Reports\/tgp_update.htm\n                    \n                    \n                   (retrieved August 10, 2011)"},{"key":"22_CR2","unstructured":"Armknecht, F., Festag, A., Westhoff, D., Zeng, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: Proc. 4th WMAN, Bern, Switzerland (March 2007)"},{"issue":"1","key":"22_CR3","first-page":"39","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. Comput. Secur. Special Issue Security Ad Hoc Sensor Networks\u00a015(1), 39\u201368 (2007)","journal-title":"Comput. Secur. Special Issue Security Ad Hoc Sensor Networks"},{"issue":"8","key":"22_CR4","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/JSAC.2007.071006","volume":"25","author":"M. Raya","year":"2007","unstructured":"Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun.\u00a025(8), 1557\u20131568 (2007)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Guo, J., Baugh, J.P., Wang, S.: A group signature based secure and privacy-preserving vehicular communication framework. In: Proc. Mobile Netw. Veh. Environ., pp. 103\u2013108 (2007)","DOI":"10.1109\/MOVE.2007.4300813"},{"issue":"6","key":"22_CR6","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS:A secure and privacy Preserving protocol for vehicular communications. IEEE Trans. Veh. Technol.\u00a056(6), 3442\u20133456 (2007)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"22_CR7","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TVT.2008.2002581","volume":"58","author":"V. Daza","year":"2009","unstructured":"Daza, V., Domingo-Ferrer, J., Sebe, F., Viejo, A.: Trustworthy privacy-Preserving car-generated announcements in vehicular ad hoc networks. IEEE Trans. Veh. Technol.\u00a058(4), 1876\u20131886 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"22_CR8","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/TVT.2009.2034669","volume":"59","author":"Q. Wu","year":"2010","unstructured":"Wu, Q., Domingo-Ferrer, J.: Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications. IEEE Trans. Veh. Technol.\u00a059(2), 559\u2013573 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-73420-8_37","volume-title":"Automata, Languages and Programming","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Unrestricted aggregate signatures. In: Arge, L., Cachin, C., Jurdzi\u0144ski, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol.\u00a04596, pp. 411\u2013422. Springer, Heidelberg (2007)"},{"key":"22_CR10","unstructured":"Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers, \n                    \n                      http:\/\/eprint.iacr.org\/2006\/165.pdf"},{"key":"22_CR11","unstructured":"The Network Simulator-ns-2, \n                    \n                      http:\/\/nsnam.isi.edu\/nsnam\/index.php\/Main_Page"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Saha, A.K., Johnson, D.B.: Modeling mobility for vehicular ad hoc networks. In: Proc. 1st VANET, pp. 91\u201392 (2004)","DOI":"10.1145\/1023875.1023892"},{"key":"22_CR13","unstructured":"Multiprecision Integer and Rational Arithmetic C\/C++ Library (MIRACL), \n                    \n                      http:\/\/indigo.ie\/mscott"}],"container-title":["Lecture Notes in Computer Science","Internet of Vehicles \u2013 Technologies and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11167-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T10:49:05Z","timestamp":1558954145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11167-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111667","9783319111674"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11167-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}