{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T21:40:20Z","timestamp":1741470020492,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642232992"},{"type":"electronic","value":"9783642233005"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23300-5_21","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T12:34:23Z","timestamp":1313584463000},"page":"271-285","source":"Crossref","is-referenced-by-count":1,"title":["Securing Location-Aware Services Based on Online\/Offline Signatures in VANETs"],"prefix":"10.1007","author":[{"given":"Chul","family":"Sur","sequence":"first","affiliation":[]},{"given":"Youngho","family":"Park","sequence":"additional","affiliation":[]},{"given":"Takashi","family":"Nishide","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]},{"given":"Kyung Hyune","family":"Rhee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"issue":"4","key":"21_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L. Chen","year":"2007","unstructured":"Chen, L., Chen, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. International Journal of Information Security\u00a06(4), 213\u2013241 (2007)","journal-title":"International Journal of Information Security"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-72738-5_2","volume-title":"Applied Cryptography and Network Security","author":"X. Chen","year":"2007","unstructured":"Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient generic on-line\/off-line sinatures without key exposure. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 18\u201330. Springer, Heidelberg (2007)"},{"issue":"8","key":"21_CR4","doi-asserted-by":"publisher","first-page":"1590","DOI":"10.1109\/JSAC.2007.071008","volume":"25","author":"M.D. Dikaiakos","year":"2007","unstructured":"Dikaiakos, M.D., Florides, A., Nadeem, T., Iftode, L.: Location-aware services over vehicular ad-hoc networks using car-to-car communication. IEEE Journal on Selected Areas in Communications\u00a025(8), 1590\u20131602 (2007)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Dikaiakos, M.D., Iqbal, S., Nadeem, T., Iftode, L.: VITP: An information transfer protocol for vehicular computing. In: 2nd ACM Internationial Workshop on Vehicular Ad Hoc Networks (VANET 2005), pp. 30\u201339 (2005)","DOI":"10.1145\/1080754.1080759"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-02384-2_9","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"D. Galindo","year":"2009","unstructured":"Galindo, D., Garcia, F.D.: A Schnorr-like lightweight identity-based signature scheme. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 135\u2013148. Springer, Heidelberg (2009)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/11745853_17","volume-title":"Public Key Cryptography - PKC 2006","author":"C. Gentry","year":"2006","unstructured":"Gentry, C., Ramzan, Z.: Identity-based aggregate signature. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 257\u2013273. Springer, Heidelberg (2006)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Karp, B., Kung, H.: Greedy perimeter stateless routing for wireless networks. In: 6th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 243\u2013254 (2000)","DOI":"10.1145\/345910.345953"},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1052871.1052875","volume":"8","author":"W. Kiess","year":"2004","unstructured":"Kiess, W., F\u00fc\u00dfler, H., Widmer, J., Mauve, M.: Hierarchical location service for mobile ad-hoc networks. ACM Sigmobile Mobile Computing and Communications Review\u00a08(4), 47\u201358 (2004)","journal-title":"ACM Sigmobile Mobile Computing and Communications Review"},{"key":"21_CR10","unstructured":"Krawczyk, H., Rabin, T.: Chameleon signatures. In: Symposium on Network and Distributed Systems Security (NDSS 2000), pp. 143\u2013154 (2000)"},{"issue":"5","key":"21_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/WC-M.2006.250353","volume":"13","author":"T. Leinmuller","year":"2006","unstructured":"Leinmuller, T., Schoch, E., Kargl, F.: Position verification approaches for vehicular ad hoc networks. IEEE Wireless Communications\u00a013(5), 16\u201321 (2006)","journal-title":"IEEE Wireless Communications"},{"issue":"6","key":"21_CR12","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology\u00a056(6), 3442\u20133456 (2007)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008, pp. 1229\u20131237 (2008)","DOI":"10.1109\/INFOCOM.2007.179"},{"issue":"3","key":"21_CR14","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1031483.1031487","volume":"8","author":"T. Nadeem","year":"2004","unstructured":"Nadeem, T., Dashtinezhadd, S., Liao, C., Iftode, L.: Trafficview: Traffic data dissemination using car-to-car communication. ACM Sigmobile Mobile Computing and Communications Review\u00a08(3), 6\u201319 (2004)","journal-title":"ACM Sigmobile Mobile Computing and Communications Review"},{"issue":"3","key":"21_CR15","first-page":"785","volume":"26","author":"Y. Park","year":"2010","unstructured":"Park, Y., Sur, C., Jung, C., Rhee, K.H.: An efficient anonymous authentication protocol for secure vehicular communications. Journal of Information Science and Engineering\u00a026(3), 785\u2013800 (2010)","journal-title":"Journal of Information Science and Engineering"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Pathak, V., Yao, D., Iftode, L.: Securing location aware services over VANET using geographical secure path routing. In: IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 346\u2013353 (2008)","DOI":"10.1109\/ICVES.2008.4640905"},{"issue":"1","key":"21_CR17","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. Journal of Computer Security\u00a015(1), 39\u201368 (2007)","journal-title":"Journal of Computer Security"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Ren, Z., Li, W., Yang, Q.: Location verification for VANETs routing. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 141\u2013146 (2009)","DOI":"10.1109\/WiMob.2009.33"},{"key":"21_CR19","unstructured":"Selvi, S.S.D., Vivek, S.S., Shriram, J., Rangan, C.P.: Efficient and provably secure identity based aggregate signature schemes with partial and full aggregation. Cryptography ePrint Archive, Report 2010\/461 (2010)"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-44647-8_21","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"A. Shamir","year":"2001","unstructured":"Shamir, A., Tauman, Y.: Improved online\/offline signature schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 355\u2013367. Springer, Heidelberg (2001)"},{"key":"21_CR21","unstructured":"Dedicated Short Range Communications (DSRC), http:\/\/www.leearmstrong.com\/dsrc\/dsrchomeset.htm"},{"key":"21_CR22","unstructured":"Overhaul of IEEE 802.11 Modeling and Simulation in NS-2, http:\/\/dsn.tm.uni-karlsruhe.de\/Overhaul_NS-2.php"},{"key":"21_CR23","unstructured":"Pairing-Based Cryptography Library, http:\/\/crypto.stanford.edu\/pbc"},{"key":"21_CR24","unstructured":"Simulation of Urban Mobility, http:\/\/sourceforge.net\/projects\/sumo"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security for Business, Enterprise and Health Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23300-5_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T21:17:15Z","timestamp":1741468635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23300-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642232992","9783642233005"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23300-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}