{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T17:10:07Z","timestamp":1750957807438,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694702"},{"type":"electronic","value":"9783319694719"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69471-9_29","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T14:03:44Z","timestamp":1508508224000},"page":"396-410","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service"],"prefix":"10.1007","author":[{"given":"Xingwen","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Adhikari, V.K., Guo, Y., Hao, F., Varvello, M., Hilt, V., Steiner, M., Zhang, Z.: Unreeling netflix: Understanding and improving multi-cdn movie delivery. In: Greenberg, A.G., Sohraby, K. (eds.) Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, 25\u201330 March 2012, pp. 1620\u20131628. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195531"},{"key":"29_CR2","unstructured":"Wikipedia: Personally identifiable information, February 2017. https:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information"},{"issue":"4","key":"29_CR3","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TMM.2011.2115996","volume":"13","author":"X Zhu","year":"2011","unstructured":"Zhu, X., Pan, R., Prabhu, M.S., Dukkipati, N., Subramanian, V., Bonomi, F.: Layered internet video adaptation (LIVA): network-assisted bandwidth sharing and transient loss protection for video streaming. IEEE Trans. Multimedia 13(4), 720\u2013732 (2011)","journal-title":"IEEE Trans. Multimedia"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Zhu, X., Zhu, J., Pan, R., Prabhu, M.S., Bonomi, F.: Cloud-assisted streaming for low-latency applications. In: International Conference on Computing, Networking and Communications, ICNC 2012, Maui, HI, USA, 30 January\u20132 February 2012, pp. 949\u2013953. IEEE Computer Society (2012)","DOI":"10.1109\/ICCNC.2012.6167565"},{"issue":"10","key":"29_CR5","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2016","unstructured":"Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurrency Comput. Pract. Exp. 28(10), 2991\u20133005 (2016)","journal-title":"Concurrency Comput. Pract. Exp."},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14\u201317 May 2000, pp. 56\u201373. IEEE Computer Society (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Sun, Q., Apostolopoulos, J.G., Wong, W.: Rate-distortion-authentication optimized streaming with generalized butterfly graph authentication. In: Proceedings of the International Conference on Image Processing, ICIP 2008, San Diego, California, USA, 12\u201315 October 2008, pp. 3096\u20133099. IEEE (2008)","DOI":"10.1109\/ICIP.2008.4712450"},{"issue":"4","key":"29_CR8","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1109\/TMM.2007.893338","volume":"9","author":"Z Li","year":"2007","unstructured":"Li, Z., Sun, Q., Lian, Y., Chen, C.W.: Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks. IEEE Trans. Multimedia 9(4), 837\u2013850 (2007)","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"29_CR9","first-page":"30","volume":"8","author":"X Zhu","year":"2012","unstructured":"Zhu, X., Chen, C.W.: A joint layered scheme for reliable and secure mobile JPEG-2000 streaming. TOMCCAP 8(3), 30 (2012)","journal-title":"TOMCCAP"},{"issue":"1","key":"29_CR10","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/TIFS.2015.2481366","volume":"11","author":"X Zhu","year":"2016","unstructured":"Zhu, X., Chen, C.W.: A joint source-channel adaptive scheme for wireless H.264\/AVC video authentication. IEEE Trans. Inf. Forensics Secur. 11(1), 141\u2013153 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-62494-5_6","volume-title":"Security Protocols","author":"RL Rivest","year":"1997","unstructured":"Rivest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 69\u201387. Springer, Heidelberg (1997). doi: 10.1007\/3-540-62494-5_6"},{"issue":"1","key":"29_CR12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TVT.2013.2274288","volume":"63","author":"MH Au","year":"2014","unstructured":"Au, M.H., Liu, J.K., Fang, J., Jiang, Z.L., Susilo, W., Zhou, J.: A new payment system for enhancing location privacy of electric vehicles. IEEE Trans. Veh. Technol. 63(1), 3\u201318 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"29_CR13","unstructured":"Hussain, R., Kim, D., Nogueira, M., Son, J., Tokuta, A.O., Oh, H.: PBF: a new privacy-aware billing framework for online electric vehicles with bidirectional auditability. CoRR abs\/1504.05276 (2015)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Zhao, T., Wei, L., Zhang, C.: A secure and privacy-preserving billing scheme for online electric vehicles. In: IEEE 83rd Vehicular Technology Conference, VTC Spring 2016, Nanjing, China, 15\u201318 May 2016, pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/VTCSpring.2016.7504103"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Rezaeifar, Z., Hussain, R., Kim, S., Oh, H.: A new privacy aware payment scheme for wireless charging of electric vehicles. Wireless Pers. Commun, 1\u201318 (2016)","DOI":"10.1007\/s11277-016-3589-x"},{"key":"29_CR16","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"D Wang","year":"2014","unstructured":"Wang, D., Wang, P.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73, 41\u201357 (2014)","journal-title":"Comput. Netw."},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2014, Istanbul, Turkey, 6\u20139 April 2014, pp. 3136\u20133141. IEEE (2014)","DOI":"10.1109\/WCNC.2014.6953015"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Odelu, V., Banerjee, S., Das, A.K., Chattopadhyay, S., Kumari, S., Li, X., Goswami, A.: A secure anonymity preserving authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun., May 2017","DOI":"10.1007\/s11277-017-4302-4"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Neuman, B.C., Medvinsky, G.: Requirements for network payment: The netcheque perspective. In: COMPCON, pp. 32\u201336 (1995)","DOI":"10.1109\/CMPCON.1995.512360"},{"key":"29_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10\u201318. Springer, Heidelberg (1985). doi: 10.1007\/3-540-39568-7_2"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., Vercauteren, F. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman and Hall\/CRC (2005)","DOI":"10.1201\/9781420034981"},{"key":"29_CR22","unstructured":"Fips, N.: Announcing the advanced encryption standard (aes). Nat. Inst. Stand. Technol. (NIST) 29(8), 2200\u20132203 (2001). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-46877-3_35","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201990","author":"X Lai","year":"1991","unstructured":"Lai, X., Massey, J.L.: A proposal for a new block encryption standard. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 389\u2013404. Springer, Heidelberg (1991). doi: 10.1007\/3-540-46877-3_35"},{"issue":"4","key":"29_CR24","doi-asserted-by":"crossref","first-page":"1974","DOI":"10.1109\/T-WC.2008.080280","volume":"8","author":"Y Jiang","year":"2009","unstructured":"Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans. Wireless Commun. 8(4), 1974\u20131983 (2009)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"29_CR25","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2015","unstructured":"Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for vanets with batch verification. Wireless Netw. 21(5), 1733\u20131743 (2015)","journal-title":"Wireless Netw."},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Hussain, R., Kim, D., Nogueira, M., Son, J., Tokuta, A.O., Oh, H.: A new privacy-aware mutual authentication mechanism for charging-on-the-move in online electric vehicles. In: 11th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2015, Shenzhen, China, 16\u201318 December 2015, pp. 108\u2013115. IEEE Computer Society (2015)","DOI":"10.1109\/MSN.2015.31"},{"issue":"5","key":"29_CR27","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69471-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T16:38:58Z","timestamp":1750955938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69471-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694702","9783319694719"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69471-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}