{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T03:24:38Z","timestamp":1761967478157,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642248603"},{"type":"electronic","value":"9783642248610"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24861-0_20","type":"book-chapter","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T01:18:10Z","timestamp":1318382290000},"page":"293-308","source":"Crossref","is-referenced-by-count":21,"title":["APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Domingo-Ferrer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Dedicated Short Range Communications (DRSC) home, \n                    \n                      http:\/\/www.leearmstrong.com\/Dsrc\/DSRCHomeset.htm"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 41\u201355. Springer, Heidelberg (2004)"},{"key":"20_CR3","first-page":"19","volume-title":"ACM VANET 2007","author":"G. Calandriello","year":"2007","unstructured":"Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in vanet. In: ACM VANET 2007, pp. 19\u201328. ACM Press, New York (2007)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"issue":"4","key":"20_CR5","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TVT.2008.2002581","volume":"58","author":"V. Daza","year":"2009","unstructured":"Daza, V., Domingo-Ferrer, J., Seb\u00e9, F., Viejo, A.: Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology\u00a058(4), 1876\u20131886 (2009)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-642-17373-8_34","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"E. Kiltz","year":"2010","unstructured":"Kiltz, E., Pietrzak, K.: Leakage resilient elGamal encryption. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol.\u00a06477, pp. 595\u2013612. Springer, Heidelberg (2010)"},{"issue":"206","key":"20_CR7","first-page":"865","volume":"62","author":"G. Frey","year":"1994","unstructured":"Frey, G., R\u00fcck, H.-G.: A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computation\u00a062(206), 865\u2013874 (1994)","journal-title":"Mathematics of Computation"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/11745853_17","volume-title":"Public Key Cryptography - PKC 2006","author":"C. Gentry","year":"2006","unstructured":"Gentry, C., Ramzan, Z.: Identity-Based Aggregate Signatures. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 257\u2013273. Springer, Heidelberg (2006)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-03356-8_18","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"T. Icart","year":"2009","unstructured":"Icart, T.: How to hash into elliptic curves. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 303\u2013316. Springer, Heidelberg (2009)"},{"issue":"4","key":"20_CR10","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1109\/T-WC.2008.080280","volume":"8","author":"Y. Jiang","year":"2009","unstructured":"Jiang, Y., Shi, M., Shen, X., Lin, C.: BAT: A robust signature scheme for vehicular networks using binary authentication trees. IEEE Transactions on Wireless Communications\u00a08(4), 1974\u20131983 (2009)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P. Kocher","year":"1996","unstructured":"Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"issue":"6","key":"20_CR12","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology\u00a056(6), 3442\u20133456 (2007)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"20_CR13","first-page":"1229","volume-title":"IEEE INFOCOM 2008","author":"R. Lu","year":"2008","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P., Shen, X.: ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008, pp. 1229\u20131237. IEEE Computer Society Press, Los Alamitos (2008)"},{"issue":"5","key":"20_CR14","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. Menezes","year":"1993","unstructured":"Menezes, A., Okamoto, T., Vanstone, S.A.: Reducing elliptic curves logarithms to logarithms in a finite field. IEEE Transactions on Information Theory\u00a039(5), 1639\u20131646 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR15","unstructured":"Papadimitratos, P., Gligor, V., Hubaux, J.: Securing vehicular communications - Assumptions, requirements, and principles. In: ESCAR 2006 (2006)"},{"key":"20_CR16","first-page":"76","volume-title":"ACM VANET 2006","author":"F. Picconi","year":"2006","unstructured":"Picconi, F., Ravi, N., Gruteser, M., Iftode, L.: Probabilistic validation of aggregated data in vehicular ad hoc networks. In: ACM VANET 2006, pp. 76\u201385. ACM Press, New York (2006)"},{"key":"20_CR17","first-page":"11","volume-title":"ACM SASN 2005","author":"M. Raya","year":"2005","unstructured":"Raya, M., Hubaux, J.: The security of vehicular ad hoc networks. In: ACM SASN 2005, pp. 11\u201321. ACM Press, New York (2005)"},{"issue":"1","key":"20_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.: Securing vehicular ad hoc networks. Journal of Computer Security\u00a015(1), 39\u201368 (2007)","journal-title":"Journal of Computer Security"},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-540-73408-6_20","volume-title":"Public Key Infrastructure","author":"C. Satiz\u00e1bal","year":"2007","unstructured":"Satiz\u00e1bal, C., Mart\u00ednez-Pel\u00e1ez, R., Forn\u00e9, J., Rico-Novella, F.: Reducing the computational cost of certification path validation in mobile payment. In: L\u00f3pez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol.\u00a04582, pp. 280\u2013296. Springer, Heidelberg (2007)"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F. Standaert","year":"2009","unstructured":"Standaert, F., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 443\u2013461. Springer, Heidelberg (2009)"},{"key":"20_CR22","unstructured":"Wasef, A., Shen, X.: ASIC: Aggregate signatures and certificates verification scheme for vehicular networks, \n                    \n                      http:\/\/www.engine.lib.uwaterloo.ca"},{"issue":"2","key":"20_CR23","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/TVT.2009.2034669","volume":"59","author":"Q. Wu","year":"2010","unstructured":"Wu, Q., Domingo-Ferrer, J., Gonzalez-Nicolas, U.: Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Transactions on Vehicular Technology\u00a059(2), 559\u2013573 (2010)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-01001-9_9","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"Q. Wu","year":"2009","unstructured":"Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 153\u2013170. Springer, Heidelberg (2009)"},{"key":"20_CR25","first-page":"246","volume-title":"IEEE INFOCOM 2008","author":"C. Zhang","year":"2008","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: IEEE INFOCOM 2008, pp. 246\u2013250. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-642-14031-0_54","volume-title":"Computing and Combinatorics","author":"L. Zhang","year":"2010","unstructured":"Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: Thai, M.T., Sahni, S. (eds.) COCOON 2010. LNCS, vol.\u00a06196, pp. 510\u2013519. Springer, Heidelberg (2010)"},{"issue":"4","key":"20_CR27","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/TVT.2009.2038222","volume":"59","author":"L. Zhang","year":"2010","unstructured":"Zhang, L., Wu, Q., Solanas, A., Domingo-Ferrer, J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology\u00a059(4), 1606\u20131617 (2010)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"20_CR28","first-page":"1436","volume-title":"IEEE ICC 2008","author":"H. Zhu","year":"2008","unstructured":"Zhu, H., Lin, X., Lu, R., Ho, P., Shen, X.: AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In: IEEE ICC 2008, pp. 1436\u20131440. IEEE Computer Society Press, Los Alamitos (2008)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24861-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T09:53:09Z","timestamp":1555149189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24861-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642248603","9783642248610"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24861-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}