{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T02:20:01Z","timestamp":1764210001514},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223471"},{"type":"electronic","value":"9783642223488"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22348-8_23","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:59:57Z","timestamp":1309283997000},"page":"271-279","source":"Crossref","is-referenced-by-count":6,"title":["Accurate Accident Reconstruction in VANET"],"prefix":"10.1007","author":[{"given":"Yuliya","family":"Kopylova","sequence":"first","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Croft, A.: Sensing Diagnostic Module: The modern motor vehicle\u2019s \u201dblack box\u201d"},{"key":"23_CR2","unstructured":"Dotzer, F., et al.: Secure Communication for Intersection Assistance. In: 2nd International Workshop on Intelligent Transportation (2005)"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"van Eenennaam, E., et al.: Exploring the Solution Space of Beaconing in VANETs. In: 1st IEEE Vehicular Networking Conference (2009)","DOI":"10.1109\/VNC.2009.5416370"},{"key":"23_CR5","first-page":"1","volume-title":"3rd IW on VANET","author":"T. Elbatt","year":"2006","unstructured":"Elbatt, T., et al.: Cooperative Collision Warning Using Dedicated Short Range Wireless Communications. In: 3rd IW on VANET, pp. 1\u20139. ACM Press, New York (2006)"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.aap.2007.08.011","volume":"40","author":"H. Gabler","year":"2008","unstructured":"Gabler, H., Hampton, C.: Estimating Crash Severity: Can event data recorders replace crash reconstruction? Accident Analysis & Prevention\u00a040, 548\u2013558 (2008)","journal-title":"Accident Analysis & Prevention"},{"key":"23_CR7","unstructured":"Haight, W.: Automobile Event Data Recorder (EDR) Technology - Evolution, Data, and Reliability. Tech. rep., Collision Safety Institute (2001)"},{"key":"23_CR8","doi-asserted-by":"crossref","DOI":"10.1002\/9780470740637","volume-title":"VANET Vehicular Applications and Inter-Networking Technologies","author":"H. Hartenstein","year":"2010","unstructured":"Hartenstein, H., Laberteaux, K.: VANET Vehicular Applications and Inter-Networking Technologies. John Wiley & Sons, Chichester (2010)"},{"key":"23_CR9","unstructured":"Lofgren, M.: Handbook for the Accident Reconstructionist. IPTM (1983)"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/JPROC.2005.849725","volume":"93","author":"N. Navet","year":"2005","unstructured":"Navet, N., et al.: Trends in Automotive Communication Systems. IEEE\u00a093, 1024\u20131223 (2005)","journal-title":"IEEE"},{"key":"23_CR11","unstructured":"NHTSA: Final Rule: Event Data Recorders (2006)"},{"key":"23_CR12","unstructured":"Niehoff, P., et al.: Evaluation of Event Data Recorderss in Full Systems Crash Tests. Tech. rep., NHTSA (2006)"},{"key":"23_CR13","unstructured":"project, C..D.: C&D WP-1 Requirements Document. Tech. rep. (2009)"},{"key":"23_CR14","unstructured":"Raya, M., Hubaux, J.P.: Security Aspects of Inter-Vehicle Communications. In: 5th Swiss Transport Research Conference (2005)"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-76929-3_17","volume-title":"Advances in Computer Science \u2013 ASIAN 2007. Computer and Network Security","author":"V. Shmatikov","year":"2007","unstructured":"Shmatikov, V., Wang, M.-H.: Secure Verification of Location Claims with Simultaneous Distance Modification. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol.\u00a04846, pp. 181\u2013195. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22348-8_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T21:21:16Z","timestamp":1686172876000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22348-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223471","9783642223488"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22348-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}