{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:08:08Z","timestamp":1725570488477},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642179938"},{"type":"electronic","value":"9783642179945"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17994-5_21","type":"book-chapter","created":{"date-parts":[[2010,11,29]],"date-time":"2010-11-29T12:01:50Z","timestamp":1291032110000},"page":"314-327","source":"Crossref","is-referenced-by-count":5,"title":["Establishing Trust on VANET Safety Messages"],"prefix":"10.1007","author":[{"given":"Subir","family":"Biswas","sequence":"first","affiliation":[]},{"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Draft amendment for wireless access in vehicular environments (WAVE). IEEE, New York, IEEE Draft 802.11p (July 2007)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Eichler, S.: Performance evaluation of the ieee 802.11p wave communication standard. In: IEEE 66th Vehicular Technology Conference, VTC-2007, 30 2007-October 3, pp. 2199\u20132203 (Fall 2007)","DOI":"10.1109\/VETECF.2007.461"},{"key":"21_CR3","first-page":"48","volume-title":"CCS 1996: Proceedings of the 3rd ACM Conference on Computer and Communications Security","author":"M. Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: CCS 1996: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48\u201357. ACM, New York (1996)"},{"key":"21_CR4","first-page":"13","volume-title":"SSYM 1998: Proceedings of the 7th Conference on USENIX Security Symposium","author":"D.B. Johnson","year":"1998","unstructured":"Johnson, D.B., Menezes, A.J.: Elliptic curve dsa (ecsda): an enhanced dsa. In: SSYM 1998: Proceedings of the 7th Conference on USENIX Security Symposium, p. 13. USENIX Association, Berkeley (1998)"},{"key":"21_CR5","unstructured":"IEEE trial-use standard for wireless access in vehicular environments (wave)- security services for applications and management messages. IEEE, New York (July 2006) IEEE Std 1609.2"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/ISDA.2008.53","volume-title":"ISDA 2008: Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications","author":"M.-H. Chang","year":"2008","unstructured":"Chang, M.-H., Chen, I.-T., Chen, M.-T.: Design of proxy signature in ecdsa. In: ISDA 2008: Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications, pp. 17\u201322. IEEE Computer Society, Washington (2008)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Sun, X., Xia, M.: An improved proxy signature scheme based on elliptic curve cryptography. In: International Conference on Computer and Communications Security, pp. 88\u201391 (2009)","DOI":"10.1109\/ICCCS.2009.36"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Qi, C., Wang, Y.: An improved proxy blind signature scheme based on factoring and ecdlp. In: International Conference on Computational Intelligence and Software Engineering, CiSE 2009, Wuhan, China, pp. 1\u20134 (2009)","DOI":"10.1109\/CISE.2009.5365847"},{"issue":"5","key":"21_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","volume":"13","author":"M. Raya","year":"2006","unstructured":"Raya, M., Papadimitratos, P., Hubaux, J.-P.: Securing vehicular communications. Wireless Communications, IEEE\u00a013(5), 8\u201315 (2006)","journal-title":"Wireless Communications, IEEE"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Guo, J., Baugh, J., Wang, S.: A group signature based secure and privacy-preserving vehicular communication framework, pp. 103\u2013108 (May 2007)","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Sha, K., Xi, Y., Shi, W., Schwiebert, L., Zhang, T.: Adaptive privacy-preserving authentication in vehicular networks. In: Proceedings of the First International Conference on Communications and Networking in China, ChinaCom 2006, pp. 1\u20138 (October 2006)","DOI":"10.1109\/CHINACOM.2006.344746"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1287748.1287752","volume-title":"VANET 2007: Proceedings of the Fourth ACM International Workshop on Vehicular Ad hoc Networks","author":"G. Calandriello","year":"2007","unstructured":"Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in vanet. In: VANET 2007: Proceedings of the Fourth ACM International Workshop on Vehicular Ad hoc Networks, pp. 19\u201328. ACM, New York (2007)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Xi, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T.: Enforcing privacy using symmetric random key-set in vehicular networks, pp. 344\u2013351 (March 2007)","DOI":"10.1109\/ISADS.2007.37"},{"issue":"6","key":"21_CR14","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.-H., Shen, X.: Gsis: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology\u00a056(6), 3442\u20133456 (2007)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/11593447_28","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"P.S.L.M. Barreto","year":"2005","unstructured":"Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 515\u2013532. Springer, Heidelberg (2005)"},{"issue":"6","key":"21_CR16","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/JCN.2009.6388411","volume":"11","author":"A. Studer","year":"2009","unstructured":"Studer, A., Bai, F., Bellur, B., Perrig, A.: Flexible, extensible, and efficient vanet authentication. Journal of Communications and Networks\u00a011(6), 574\u2013588 (2009)","journal-title":"Journal of Communications and Networks"},{"issue":"2","key":"21_CR17","first-page":"2","volume":"5","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The tesla broadcast authentication protocol. RSA CryptoBytes\u00a05(2), 2\u201313 (2002)","journal-title":"RSA CryptoBytes"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Haas, J.J., Hu, Y.-C., Laberteaux, K.P.: Real-world vanet security protocol performance. In: IEEE GLOBECOM, pp. 1\u20137 (2009)","DOI":"10.1109\/GLOCOM.2009.5426188"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Wen, H., Ho, P.-H., Gong, G.: A novel framework for message authentication in vehicular communication networks. In: Global Telecommunications Conference, IEEE GLOBECOM 2009, pp. 1\u20136 (2009)","DOI":"10.1109\/GLOCOM.2009.5425519"},{"key":"21_CR20","unstructured":"Wasef, A., Shen, X.: ASIC: Aggregate signatures and certificates verification scheme for vehicular networks. Engine (2009), https:\/\/129.97.58.88\/ojs-2.2\/index.php\/pptvt\/article\/view\/487"},{"key":"21_CR21","first-page":"223","volume-title":"ICICS 1997: Proceedings of the First International Conference on Information and Communication Security","author":"S. Kim","year":"1997","unstructured":"Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: ICICS 1997: Proceedings of the First International Conference on Information and Communication Security, pp. 223\u2013232. Springer, London (1997)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Park, J.-H., Kim, Y.-S., Chang, J.H.: A proxy blind signature scheme with proxy revocation. In: International Conference on Computational Intelligence and Security Workshops, pp. 761\u2013764 (2007)","DOI":"10.1109\/CISW.2007.4425606"},{"issue":"3","key":"21_CR23","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/BF02831144","volume":"10","author":"L. Wei-min","year":"2005","unstructured":"Wei-min, L., Zong-kai, Y., Wen-qing, C.: A new id-based proxy blind signature scheme. Wuhan University Journal of Natural Sciences\u00a010(3), 555\u2013558 (2005)","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Cai, M., Kang, L., Jia, J.: A multiple grade blind proxy signature scheme. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol.\u00a02, pp. 130\u2013133 (2007)","DOI":"10.1109\/IIH-MSP.2007.37"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Xue, Q., Li, F., Zhou, Y., Zhang, J., Cao, Z., Qian, H.: An ecdlp-based threshold proxy signature scheme using self-certified public key system. In: MobiSec 2009, pp. 58\u201370 (2009)","DOI":"10.1007\/978-3-642-04434-2_6"},{"key":"21_CR26","unstructured":"Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ecdsa). Certicom Research, Canada; and Dept. of Combinatorics and Optimization, University of Waterloo, Canada, Tech. Rep. (1999)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17994-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T16:50:13Z","timestamp":1559839813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17994-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642179938","9783642179945"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17994-5_21","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}