{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:51Z","timestamp":1725902931624},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_29","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"310-320","source":"Crossref","is-referenced-by-count":0,"title":["An Anonymous Access Authentication Scheme for VANETs Based on ISGS"],"prefix":"10.1007","author":[{"given":"Tianhan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Yanqiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"issue":"7","key":"29_CR1","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1002\/wcm.859","volume":"11","author":"FJ Martinez","year":"2011","unstructured":"Martinez, F.J., Toh, C.K., Cano, J.C., et al.: A survey and comparative study of simulators for vehicular ad hoc, networks (VANETs). Wirel. Commun. Mob. Comput. 11(7), 813\u2013828 (2011)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"4","key":"29_CR2","doi-asserted-by":"crossref","first-page":"1624","DOI":"10.1109\/TITS.2011.2158001","volume":"12","author":"J Zhang","year":"2011","unstructured":"Zhang, J., Wang, F.Y., Wang, K., et al.: Data-driven intelligent transportation systems a survey. IEEE Trans. Intel. Transp. Syst. 12(4), 1624\u20131639 (2011). 2004: 19\u201328","journal-title":"IEEE Trans. Intel. Transp. Syst."},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Xu, Q., Mak, T., Ko, J., et al.: Vehicle-to-vehicle safety messaging in DSRC. In: 2004 International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, October, pp. 19\u201328. DBLP (2004)","DOI":"10.1145\/1023875.1023879"},{"issue":"12","key":"29_CR4","first-page":"552","volume":"8","author":"G Samara","year":"2010","unstructured":"Samara, G., Al-Salihy, W.A.H., Sures, R.: Security analysis of vehicular ad hoc nerworks (VANET). Int. J. Commun. Netw. Syst. Sci. 8(12), 552\u2013566 (2010)","journal-title":"Int. J. Commun. Netw. Syst. Sci."},{"issue":"1","key":"29_CR5","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: The 27th IEEE Conference on Computer Communications, INFOCOM 2008. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.179"},{"issue":"6","key":"29_CR7","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1109\/JCN.2009.6388414","volume":"11","author":"CD Jung","year":"2009","unstructured":"Jung, C.D., Sur, C., Park, Y., et al.: A robust and efficient anonymous authentication protocol in VANETs. J. Commun. Netw. 11(6), 607\u2013614 (2009)","journal-title":"J. Commun. Netw."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Chaurasia, B.K., Verma, S., Bhasker, S.M.: Message broadcast in VANETs using group signature. In: 2008 Fourth International Conference on Wireless Communication and Sensor Networks, WCSN 2008, pp. 131\u2013136. IEEE (2008)","DOI":"10.1109\/WCSN.2008.4772697"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Advances in Cryptology, CRYPTO 1997. Lecture Notes in Computer Science, vol. 1294, pp. 410\u2013424. Springer, Heidelberg (1997)","DOI":"10.1007\/BFb0052252"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Hui, L.C.K., Yiu, S.M.: Identity based threshold ring signature. In: Proceedings of the ICISC, p. 115, December 2004","DOI":"10.1007\/11496618_17"},{"issue":"2","key":"29_CR11","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/SURV.2011.020211.00045","volume":"14","author":"S Zhao","year":"2011","unstructured":"Zhao, S., Aggarwal, A., Frost, R., Bai, X.: A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun. Surveys Tuts. 14(2), 380\u2013400 (2011)","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"4","key":"29_CR12","doi-asserted-by":"crossref","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"KA Shim","year":"2012","unstructured":"Shim, K.A.: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874\u20131883 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Lu, H., Li, J., Guizani, M.: A novel ID-based authentication framework with adaptive privacy preservation for VANETs. In: Computing, Communications and Applications Conference (ComComAp 2012), pp. 345\u2013350. IEEE (2012)","DOI":"10.1109\/ComComAp.2012.6154869"},{"issue":"4","key":"29_CR14","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/TPDS.2014.2308215","volume":"26","author":"J Li","year":"2015","unstructured":"Li, J., Lu, H., Guizani, M.: ACPN: a novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Trans. Parallel Distrib. Syst. 26(4), 938\u2013948 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"29_CR15","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","volume":"21","author":"J Sun","year":"2010","unstructured":"Sun, J., Zhang, C., Zhang, Y., et al.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 21(9), 1227\u20131239 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Han, S., Wang, J., Liu, W.: Efficient identity-based group signature scheme over elliptic curves scheme. In: ECUMN 2004, Porto, Portugal, 25\u201327 October 2004, pp. 417\u2013429 (2004)","DOI":"10.1007\/978-3-540-30197-4_42"},{"issue":"3","key":"29_CR17","first-page":"213","volume":"32","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. SIAM J. Comput. 32(3), 213\u2013229 (2001)","journal-title":"SIAM J. Comput."},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Choon, J.C., Hee Cheon, J.: An identity-based signature from Gap Diffie-Hellman groups. In: International Workshop on Theory and Practice in Public Key Cryptography: Public KeyCryptography, pp. 18\u201330. Springer (2002)","DOI":"10.1007\/3-540-36288-6_2"},{"issue":"3","key":"29_CR19","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1109\/TITS.2011.2156790","volume":"12","author":"D Huang","year":"2011","unstructured":"Huang, D., Misra, S., Verma, M., et al.: PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans. Intel. Transp. Syst. 12(3), 736\u2013746 (2011)","journal-title":"IEEE Trans. Intel. Transp. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T10:54:59Z","timestamp":1569668099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}