{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:25:40Z","timestamp":1725675940718},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309724"},{"type":"electronic","value":"9783642309731"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30973-1_21","type":"book-chapter","created":{"date-parts":[[2012,5,23]],"date-time":"2012-05-23T15:32:31Z","timestamp":1337787151000},"page":"224-227","source":"Crossref","is-referenced-by-count":0,"title":["POSTER Towards a Privacy \u2013 Respectful Telematic Verification System for Vehicle and Driver Authorizations"],"prefix":"10.1007","author":[{"given":"Ana I.","family":"Gonz\u00e1lez-Tablas","sequence":"first","affiliation":[]},{"given":"Almudena","family":"Alcaide","sequence":"additional","affiliation":[]},{"given":"Guillermo","family":"Suarez-Tangil","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 M.","family":"de Fuentes","sequence":"additional","affiliation":[]},{"given":"Israel","family":"Barroso-Perez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","first-page":"600","volume-title":"Proc. of the 16th ACM Conf. on Computer and Communications Security, CCS 2009","author":"P. Bichsel","year":"2009","unstructured":"Bichsel, P., Camenisch, J., Gro\u00df, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proc. of the 16th ACM Conf. on Computer and Communications Security, CCS 2009, pp. 600\u2013610. ACM, New York (2009)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy. MIT Press (2000)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"21_CR3","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/0-387-33406-8_3","volume-title":"Security and Privacy in Dynamic Environments","author":"J. Camenisch","year":"2006","unstructured":"Camenisch, J., Sommer, D., Zimmermann, R.: A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. In: Fischer-H\u00fcbner, S., Rannenberg, K., Yngstr\u00f6m, L., Lindskog, S. (eds.) Security and Privacy in Dynamic Environments. IFIP AICT, vol.\u00a0201, pp. 25\u201337. Springer, Boston (2006)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Kwon, T.: Privacy preservation with x.509 standard certificates. Information Sciences, 47\u201353 (2011), doi:10.1016\/j.ins.2011.02.016 Key: citeulike:8971918","DOI":"10.1016\/j.ins.2011.02.016"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-540-27809-2_21","volume-title":"Financial Cryptography","author":"G. Persiano","year":"2004","unstructured":"Persiano, G., Visconti, I.: An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 196\u2013211. Springer, Heidelberg (2004)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-45682-1_31","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E.R. Verheul","year":"2001","unstructured":"Verheul, E.R.: Self-Blindable Credential Certificates from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 533\u2013551. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30973-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T18:46:37Z","timestamp":1556822797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30973-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309724","9783642309731"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30973-1_21","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}