{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:54:00Z","timestamp":1742802840759},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_39","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"413-422","source":"Crossref","is-referenced-by-count":4,"title":["A Novel and Practical Pseudonym Change Scheme in VANETs"],"prefix":"10.1007","author":[{"given":"Yuanyuan","family":"Pan","sequence":"first","affiliation":[]},{"given":"Yongdong","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jianqing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.comcom.2015.03.002","volume":"63","author":"K Emara","year":"2015","unstructured":"Emara, K., Woerndl, W., Schlichter, J.: On evaluation of location privacy preserving schemes for VANET safety applications. Comput. Commun. 63, 11\u201323 (2015)","journal-title":"Comput. Commun."},{"key":"39_CR2","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","volume":"37","author":"S Al-Sultan","year":"2014","unstructured":"Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive survey on vehicular Ad Hoc network. J. Netw. Comput. Appl. 37, 380\u2013392 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"39_CR3","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"3","author":"JP Hubaux","year":"2004","unstructured":"Hubaux, J.P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Secur. Priv. 3, 49\u201355 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: Proceedings of the 4th European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2007), pp. 129\u2013141 (2007)","DOI":"10.1007\/978-3-540-73275-4_10"},{"key":"39_CR5","unstructured":"Freudiger, J., Raya, M., F\u00e9legyh\u00e1zi, M., Papadimitratos, P., Hubaux, J.-P.: Mix-zones for location privacy in vehicular networks. In: Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 2007), pp. 1\u20137 (2007)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Carianha, A., Barreto, L., Lima, G.: Improving location privacy in mix-zones for vanets. In: Proceedings of 2011 IEEE 30th International Conference on Performance Computing and Communications Conference (IPCCC), pp. 1\u20136 (2011)","DOI":"10.1109\/PCCC.2011.6108111"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: Proceedings of 2005 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1187\u20131192 (2005)","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Holczer, T., Weimerskirch, A., Whyte, W.: Slow: a practical pseudonym changing scheme for location privacy in vanets. In: Proceedings of the First IEEE Vehicular Networking Conference (VNC 2009), pp. 1\u20138 (2009)","DOI":"10.1109\/VNC.2009.5416380"},{"key":"39_CR9","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","volume":"25","author":"K Sampigethaya","year":"2007","unstructured":"Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: robust location privacy scheme for vanet. IEEE Sel. Areas Commun. 25, 1569\u20131589 (2007)","journal-title":"IEEE Sel. Areas Commun."},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.: Support of anonymity in VANETs\u2013putting pseudonymity into practice. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), pp. 3400\u20133405 (2007)","DOI":"10.1109\/WCNC.2007.625"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Schoch, E., Kargl, F., Leinmuller, T., Schlott, S., Papadimitratos, P.: Impact of pseudonym changes on geographic routing in vanets. In: Proceedings of the Third European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006), pp. 43\u201357 (2006)","DOI":"10.1007\/11964254_6"},{"key":"39_CR12","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/s11036-009-0167-4","volume":"15","author":"J-H Song","year":"2010","unstructured":"Song, J.-H., Wong, V.W.S., Leung, V.C.M.: Wireless location privacy protection in vehicular ad-hoc networks. Mob. Netw. Appl. 15, 160\u2013171 (2010)","journal-title":"Mob. Netw. Appl."},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Gerlach, M., G\u00fcttler, F.: Privacy in vanets using changing pseudonyms - ideal and real. In: Proceedings of IEEE 65th Vehicular Technology Conference (VTC2007), pp. 2521\u20132525 (2007)","DOI":"10.1109\/VETECS.2007.519"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing and swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (WPES 2006), pp. 19\u201328 (2006)","DOI":"10.1145\/1179601.1179605"},{"key":"39_CR15","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R Lu","year":"2012","unstructured":"Lu, R., Li, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 61, 86\u201396 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Freudiger, J., Manshaei, M., Hubaux, J.-P., Parkes, D.: On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 324\u2013337 (2009)","DOI":"10.1145\/1653662.1653702"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:18:33Z","timestamp":1499156313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}