{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:48:45Z","timestamp":1775188125639,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642252426","type":"print"},{"value":"9783642252433","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25243-3_10","type":"book-chapter","created":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T10:18:58Z","timestamp":1320229138000},"page":"121-135","source":"Crossref","is-referenced-by-count":18,"title":["Preserving Security and Privacy in Large-Scale VANETs"],"prefix":"10.1007","author":[{"given":"Bo","family":"Qin","sequence":"first","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Domingo-Ferrer","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"5GHz Band Dedicated Short Range Communications (DSRC), ASTM E2213-03, http:\/\/www.iteris.com\/itsarch\/html\/standard\/dsrc5ghz.htm"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/BFb0054130","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Garay, J.A., Rabin, T.: Fast Batch Verification for Modular Exponentiation and Digital Signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 236\u2013250. Springer, Heidelberg (1998)"},{"issue":"10","key":"10_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSPEC.2008.4635041","volume":"45","author":"J. Blau","year":"2008","unstructured":"Blau, J.: Car talk. IEEE Spectrum\u00a045(10), 16 (2008)","journal-title":"IEEE Spectrum"},{"issue":"4","key":"10_CR4","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. Journal of Cryptology\u00a017(4), 297\u2013319 (2004)","journal-title":"Journal of Cryptology"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Calandriello, G., Papadimitratos, P., Lioy, A., Hubaux, J.-P.: Efficient and Robust Pseudonymous Authentication in VANET. In: ACM International Workshop on Vehicular Ad Hoc Networks-VANET, pp. 19\u201328. ACM Press (2007)","DOI":"10.1145\/1287748.1287752"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-72540-4_14","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"J. Camenisch","year":"2007","unstructured":"Camenisch, J., Hohenberger, S., Pedersen, M.\u00d8.: Batch Verification of Short Signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 246\u2013263. Springer, Heidelberg (2007)"},{"key":"10_CR7","unstructured":"Car2Car Communication Consortium, http:\/\/www.car-2-car.org\/"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TVT.2008.2002581","volume":"58","author":"V. Daza","year":"2009","unstructured":"Daza, V., Domingo-Ferrer, J., Seb\u00e9, F., Viejo, A.: Trustworthy Privacy-Preserving Car-generated Announcements in Vehicular Ad-Hoc Networks. IEEE Transaction on Vehehicluar Technology\u00a058(4), 1876\u20131886 (2009)","journal-title":"IEEE Transaction on Vehehicluar Technology"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.\u00d8.: On the Practicality of Short Signature Batch Verification, http:\/\/eprint.iacr.org\/2008\/015.pdf","DOI":"10.1007\/978-3-642-00862-7_21"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of Anonymity in VANETs - Putting Pseudonymity into Practice. In: IEEE Wireless Communications and Networking Conference-WCNC, pp. 3400\u20133405. IEEE Press (2007)","DOI":"10.1109\/WCNC.2007.625"},{"key":"10_CR12","unstructured":"Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for Cryptographers, http:\/\/eprint.iacr.org\/2006\/165.pdf"},{"key":"10_CR13","unstructured":"Gerlach, M., Festag, A., Leinm\u00fcller, T., Goldacker, G., Harsch, C.: Security Architecture for Vehicular Communication. In: WIT 2005 (2005), http:\/\/www.network-on-wheels.de\/downloads\/wit07secarch.pdf"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Golle, P., Greene, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: ACM International Workshop on Vehicular Ad Hoc Networks-VANET, pp. 29\u201337. ACM Press (2004)","DOI":"10.1145\/1023875.1023881"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Guo, J., Baugh, J.P., Wang, S.: A Group Signature Based Secure and Privacy-preserving Vehicular Communication Framework. In: Mobile Networking for Vehicular Environments 2007, pp. 103\u2013108 (2007)","DOI":"10.1109\/MOVE.2007.4300813"},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/5326.760570","volume":"29","author":"J.-H. Lee","year":"1999","unstructured":"Lee, J.-H., Lee-Kwang, H.: Distributed and Cooperative Fuzzy Controllers for Traffic Intersections Group. IEEE Transactions on Systems, Man & Cybernetics\u00a029(2), 263\u2013271 (1999)","journal-title":"IEEE Transactions on Systems, Man & Cybernetics"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Leinm\u00fcller, T., Maih\u00f6fer, C., Schoch, E., Kargl, F.: Improved Security in Geographic Ad-Hoc Routing through Autonomous Position Verification. In: ACM International Workshop on Vehicular Ad hoc Networks-VANET, pp. 57\u201366. ACM Press (2006)","DOI":"10.1145\/1161064.1161075"},{"issue":"6","key":"10_CR18","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications. IEEE Transaction on Vehehicluar Technology\u00a056(6), 3442\u20133456 (2007)","journal-title":"IEEE Transaction on Vehehicluar Technology"},{"key":"10_CR19","unstructured":"Network on Wheels, http:\/\/www.network-on-wheels.de\/"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., Raya, M.: Architecture for Secure and Private Vehicular Communications. In: International Conference on ITS Telecommunications, pp. 1\u20136 (2007)","DOI":"10.1109\/ITST.2007.4295890"},{"key":"10_CR21","unstructured":"Parno, B., Perrig, A.: Challenges in Securing Vehicular Networks. In: HOTNETS 2005, http:\/\/conferences.sigcomm.org\/hotnets\/2005\/papers\/parno.pdf"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-01440-6_8","volume-title":"Information Security and Cryptology","author":"B. Qin","year":"2009","unstructured":"Qin, B., Wu, Q., Susilo, W., Mu, Y.: Publicly Verifiable Privacy-Preserving Group Decryption. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol.\u00a05487, pp. 72\u201383. Springer, Heidelberg (2009)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Raya, M., Aziz, A., Hubaux, J.-P.: Efficient Secure Aggregation in VANETs. In: ACM International Workshop on Vehicular Ad hoc Networks-VANET, pp. 67\u201375. ACM Press (2006)","DOI":"10.1145\/1161064.1161076"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad-Hoc Networks. In: ACM Workshop on Security of Ad hoc and Sensor Networks-SASN, pp. 11\u201321. ACM Press (2005)","DOI":"10.1145\/1102219.1102223"},{"issue":"1","key":"10_CR25","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.-P.: Securing Vehicular Ad Hoc Networks. Journal of Computer Security\u00a015(1), 39\u201368 (2007)","journal-title":"Journal of Computer Security"},{"issue":"8","key":"10_CR26","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/JSAC.2007.071006","volume":"25","author":"M. Raya","year":"2007","unstructured":"Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks. IEEE Journal Selected Areas in Communication\u00a025(8), 1557\u20131568 (2007)","journal-title":"IEEE Journal Selected Areas in Communication"},{"key":"10_CR27","unstructured":"Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: Providing Location Privacy for VANET. In: ESCAR 2005, http:\/\/www.ee.washington.edu\/research\/nsl\/papers\/ESCAR-05.pdf"},{"key":"10_CR28","unstructured":"Secure Vehicle Communication, http:\/\/www.sevecom.org\/"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/11506157_39","volume-title":"Information Security and Privacy","author":"V.K. Wei","year":"2005","unstructured":"Wei, V.K., Yuen, T.H., Zhang, F.: Group Signature Where Group Manager, Members and Open Authority Are Identity-based. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 468\u2013480. Springer, Heidelberg (2005)"},{"issue":"2","key":"10_CR30","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/TVT.2009.2034669","volume":"59","author":"Q. Wu","year":"2010","unstructured":"Wu, Q., Domingo-Ferrer, J., Gonz\u00e1lez-Nicol\u00e1s, U.: Balanced Trustworthiness, Safety and Privacy in Vehicle-to-vehicle Communications. IEEE Transaction on Vehehicluar Technology\u00a059(2), 559\u2013573 (2010)","journal-title":"IEEE Transaction on Vehehicluar Technology"},{"key":"10_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-01001-9_9","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"Q. Wu","year":"2009","unstructured":"Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 153\u2013170. Springer, Heidelberg (2009)"},{"key":"10_CR32","unstructured":"Zarki, M.E., Mehrotra, S., Tsudik, G., Venkatasubramanian, N.: Security Issues in a Future Vehicular Network. In: European Wireless (2002), http:\/\/www.ics.uci.edu\/~dsm\/papers\/sec001.pdf"},{"issue":"4","key":"10_CR33","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/TVT.2009.2038222","volume":"59","author":"L. Zhang","year":"2010","unstructured":"Zhang, L., Wu, Q., Solanas, A., Domingo-Ferrer, J.: A Scalable Robust Authentication Protocol for Secure Vehicular Communications. IEEE Transactions on Vehicular Technology\u00a059(4), 1606\u20131617 (2010)","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25243-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T15:39:55Z","timestamp":1741880395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25243-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252426","9783642252433"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25243-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}