{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:19:27Z","timestamp":1742980767231,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_21","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"260-271","source":"Crossref","is-referenced-by-count":1,"title":["HEPPA: Highly Efficient Privacy Preserving Authentication for ITS"],"prefix":"10.1007","author":[{"given":"An","family":"Braeken","sequence":"first","affiliation":[]},{"given":"Sergey","family":"Bezzateev","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Touhafi","sequence":"additional","affiliation":[]},{"given":"Natalia","family":"Voloshina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"21_CR1","unstructured":"Armstrong, L.: Dedicated short range communications (DSRC) home (2002)"},{"key":"21_CR2","unstructured":"Parno, B., Perrig, A.: Challenges in securing vehicular networks. Workshop on Hot Topics in Networks (HotNets-IV), pp. 1\u20136 (2005)"},{"issue":"1","key":"21_CR3","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"key":"21_CR4","first-page":"71","volume-title":"User Authentication, Computer Security Principles and Practice","author":"L Brown","year":"2012","unstructured":"Brown, L., Stallings, W.: User Authentication, Computer Security Principles and Practice, 2nd edn, pp. 71\u2013105. Pearson, Upper Saddle River (2012)","edition":"2"},{"issue":"2","key":"21_CR5","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","volume":"65","author":"F Wang","year":"2015","unstructured":"Wang, F., Xu, Y., Zhang, H., Zhang, Y., Zhu, L.: 2FLIP: a two-factor lightweight privacy preserving authentication scheme for VANET. IEEE Trans. Veh. Technol. 65(2), 896\u2013911 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 11\u201321 (2005)","DOI":"10.1145\/1102219.1102223"},{"issue":"9","key":"21_CR7","first-page":"177","volume":"9","author":"A Braeken","year":"2015","unstructured":"Braeken, A., Porambage, P.: Efficient anonym smart card based authentication scheme for multi-server. Architecture 9(9), 177\u2013184 (2015)","journal-title":"Architecture"},{"issue":"1","key":"21_CR8","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Lu, R., Lin, X., Shen, X.S.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(1), 3589\u20133603 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P., Shen, X.S.: An efficient identity based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM, pp. 246\u2013250 (2008)","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Rajput, U., Abbas, F., Eun, H., Hussain, R., Oh, H.: Two level privacy preserving pseudonymous authentication protocol for VANET. In: IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 643\u2013650 (2015)","DOI":"10.1109\/WiMOB.2015.7348023"},{"issue":"6","key":"21_CR11","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442\u20133456 (2007)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"21_CR12","doi-asserted-by":"crossref","first-page":"1606","DOI":"10.1109\/TVT.2009.2038222","volume":"59","author":"L Zhang","year":"2010","unstructured":"Zhang, L., Wu, Q., Solanas, A., Domingo, F.J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans. Veh. Technol. 59(1), 1606\u20131617 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1991","author":"D Chaum","year":"1991","unstructured":"Chaum, D., Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257\u2013265. Springer, Heidelberg (1991). doi: 10.1007\/3-540-46416-6_22"},{"key":"21_CR14","first-page":"1","volume":"35","author":"H-T Wu","year":"2011","unstructured":"Wu, H.-T., Hsieh, W.-S.: RSU-based message authentication for vehicular ad-hoc networks. Springer- Multimed Tools Appl. 35, 1\u201313 (2011)","journal-title":"Springer- Multimed Tools Appl."},{"key":"21_CR15","unstructured":"IEEE Trial-Use Standard for Wireless Access in Vehicular Environments, IEEE Standard 1609.2 Std. (2006)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Xie, Y., Wu, L., Shen, J., Alelaiwi, A.: EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommun. Syst. pp. 1\u201312 (2016)","DOI":"10.1007\/s11235-016-0222-y"},{"key":"21_CR17","doi-asserted-by":"crossref","first-page":"1503","DOI":"10.1109\/ACCESS.2015.2474705","volume":"3","author":"P Porambage","year":"2015","unstructured":"Porambage, P., Braeken, A., Schmitt, C., Gurtov, A.V., Ylianttila, M., Stiller, B.: Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. IEEE Access 3, 1503\u20131511 (2015)","journal-title":"IEEE Access"},{"key":"21_CR18","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1109\/JCN.2009.6388411","volume":"11","author":"A Studer","year":"2009","unstructured":"Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient VANET authentication. J. Commun. Netw. 11, 589\u2013598 (2009)","journal-title":"J. Commun. Netw."}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:13:51Z","timestamp":1569968031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}