{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:35:04Z","timestamp":1743125704525,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642224492"},{"type":"electronic","value":"9783642224508"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22450-8_15","type":"book-chapter","created":{"date-parts":[[2011,7,5]],"date-time":"2011-07-05T08:25:48Z","timestamp":1309854348000},"page":"191-205","source":"Crossref","is-referenced-by-count":18,"title":["Improved Access Control Mechanism in Vehicular Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Sushmita","family":"Ruj","sequence":"first","affiliation":[]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Stojmenovic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"http:\/\/crypto.stanford.edu\/pbc\/"},{"key":"15_CR2","unstructured":"Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Ph D Thesis. Technion, Haifa (1996)"},{"key":"15_CR3","first-page":"321","volume-title":"IEEE Symposium on Security and Privacy","author":"J. Bethencourt","year":"2007","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"2-3","key":"15_CR4","first-page":"177","volume":"10","author":"S. Biswas","year":"2010","unstructured":"Biswas, S., Mahbubul Haque, M., Misic, J.V.: Privacy and anonymity in vanets: A contemporary study. Ad Hoc & Sensor Wireless Networks\u00a010(2-3), 177\u2013192 (2010)","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography","author":"M. Chase","year":"2007","unstructured":"Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, pp. 515\u2013534. Springer, Heidelberg (2007)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: ACM Conference on Computer and Communications Security, pp. 121\u2013130 (2009)","DOI":"10.1145\/1653662.1653678"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Chen, N., Gerla, M., Hong, D.H.X.: Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. In: Ad Hoc Networking Workshop, Med-Hoc-Net, pp. 1\u20138 (2010)","DOI":"10.1109\/MEDHOCNET.2010.5546877"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s00145-009-9048-z","volume":"23","author":"D. Freeman","year":"2010","unstructured":"Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. J. Cryptology\u00a023(2), 224\u2013280 (2010)","journal-title":"J. Cryptology"},{"key":"15_CR11","first-page":"1577","volume-title":"INFOCOM","author":"J. Freudiger","year":"2010","unstructured":"Freudiger, J., Manshaei, M.H., Boudec, J.-Y.L., Hubaux, J.-P.: On the age of pseudonyms in mobile ad hoc networks. In: INFOCOM, pp. 1577\u20131585. IEEE, Los Alamitos (2010)"},{"issue":"7","key":"15_CR12","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.adhoc.2010.02.008","volume":"8","author":"M. Ghosh","year":"2010","unstructured":"Ghosh, M., Varghese, A., Gupta, A., Kherani, A.A., Muthaiah, S.N.: Detecting misbehaviors in vanet with integrated root-cause analysis. Ad Hoc Networks\u00a08(7), 778\u2013790 (2010)","journal-title":"Ad Hoc Networks"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Golle, P., Greene, D.H., Staddon, J.: Detecting and correcting malicious data in vanets. In: Vehicular Ad Hoc Networks, pp. 29\u201337 (2004)","DOI":"10.1145\/1023875.1023881"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"issue":"11","key":"15_CR15","first-page":"128","volume":"48","author":"D. Huang","year":"2010","unstructured":"Huang, D., Hong, X., Gerla, M.: Situation-aware trust architecture for vehicular networks. Topics In Automotive Networking\u00a048(11), 128\u2013135 (2010)","journal-title":"Topics In Automotive Networking"},{"issue":"8","key":"15_CR16","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1016\/j.adhoc.2009.04.011","volume":"7","author":"D. Huang","year":"2009","unstructured":"Huang, D., Verma, M.: ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks\u00a07(8), 1526\u20131535 (2009)","journal-title":"Ad Hoc Networks"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Kargl, F., Papadimitratos, P., Buttyan, L., Mter, M., Schoch, E., Wiedersheim, B., Thong, T.v., Cal, G., Held, A., Kung, A., Hubaux, J.p.: Secure vehicular communication systems: Implementation, performance, and research challenges. IEEE Wireless Communication Magazine, 110\u2013118 (2008)","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A. Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 568\u2013588. Springer, Heidelberg (2011), eprint.iacr.org\/2010\/351.pdf (last accessed February 22, 2011)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.p.: Secure vehicular communication systems: design and architecture. IEEE Wireless Communication Magazine, 100\u2013109 (2008)","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Park, S., Aslam, B., Turgut, D., Zou, C.C.: Defense against sybil attack in vehicular ad hoc network based on roadside unit support. In: MILCOM, pp. 1\u20137 (2009)","DOI":"10.1109\/MILCOM.2009.5379844"},{"key":"15_CR21","unstructured":"Parno, B., Perrig, A.: Challenges in security vehicular networks. In: HotNets-IV (2005)"},{"key":"15_CR22","unstructured":"Raya, M.: Data-Centric Trust in Ephemeral Networks. Ph D Thesis. EPFL, Lausanne (2009)"},{"key":"15_CR23","first-page":"1238","volume-title":"INFOCOM","author":"M. Raya","year":"2008","unstructured":"Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.: On data-centric trust establishment in ephemeral ad hoc networks. In: INFOCOM, pp. 1238\u20131246. IEEE, Los Alamitos (2008)"},{"key":"15_CR24","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1741866.1741879","volume-title":"WISEC","author":"M. Raya","year":"2010","unstructured":"Raya, M., Shokri, R., Hubaux, J.-P.: On the tradeoff between trust and privacy in wireless ad hoc networks. In: Wetzel, S., Nita-Rotaru, C., Stajano, F. (eds.) WISEC, pp. 75\u201380. ACM, New York (2010)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Ruj, S., Nayak, A., Stojmenovic, I.: Distributed fine-grained access control in wireless sensor networks. IEEE International Parallel & Distributed Processing Symposium (to appear, 2011)","DOI":"10.1109\/IPDPS.2011.42"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"key":"15_CR27","unstructured":"Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: Caravan: Providing location privacy for vanet. In: Proc. of the Workshop on Embedded Security in Cars, ESCAR (2005)"},{"issue":"8","key":"15_CR28","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","volume":"25","author":"K. Sampigethaya","year":"2007","unstructured":"Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: Robust location privacy scheme for vanet. IEEE Journal on Selected Areas in Communications\u00a025(8), 1569\u20131589 (2007)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"15_CR30","volume-title":"Cryptography: Theory and Practice","author":"D.R. Stinson","year":"2006","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. CRC Press Inc., Boca Raton (2006)","edition":"3"},{"issue":"7","key":"15_CR31","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y. Sun","year":"2010","unstructured":"Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. on Vehicular Technology\u00a059(7), 3589\u20133603 (2010)","journal-title":"IEEE Trans. on Vehicular Technology"},{"key":"15_CR32","first-page":"639","volume-title":"GLOBECOM","author":"A. Wasef","year":"2008","unstructured":"Wasef, A., Jiang, Y., Shen, X.: Ecmv: Efficient certificate management scheme for vehicular networks. In: GLOBECOM, pp. 639\u2013643. IEEE, Los Alamitos (2008)"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, http:\/\/www.eprint.iacr.org\/2009\/385.pdf","DOI":"10.1007\/978-3-642-03356-8_36"},{"issue":"4","key":"15_CR34","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/TPDS.2010.130","volume":"22","author":"S. Yu","year":"2011","unstructured":"Yu, S., Ren, K., Lou, W.: FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems\u00a022(4), 673\u2013686 (2011)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"15_CR35","first-page":"1","volume-title":"MobiQuitous","author":"T. Zhou","year":"2007","unstructured":"Zhou, T., Choudhury, R.R., Ning, P., Chakrabarty, K.: Privacy-preserving detection of sybil attacks in vehicular ad hoc networks. In: MobiQuitous, pp. 1\u20138. IEEE, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Ad-hoc, Mobile, and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22450-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:13:33Z","timestamp":1560352413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22450-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642224492","9783642224508"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22450-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}