{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:13:57Z","timestamp":1743146037078,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315121"},{"type":"electronic","value":"9783642315138"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31513-8_77","type":"book-chapter","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T09:39:17Z","timestamp":1340962757000},"page":"757-763","source":"Crossref","is-referenced-by-count":1,"title":["Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET"],"prefix":"10.1007","author":[{"given":"Manpreet","family":"Kaur","sequence":"first","affiliation":[]},{"family":"Rajni","sequence":"additional","affiliation":[]},{"given":"Parminder","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"77_CR1","doi-asserted-by":"crossref","unstructured":"Karp, B., Kung, H.T.: GPRS: Greedy Perimeter Stateless Routing for wireless networks. In: Proc. 6th Annual Int. Conf. on Mob. Computing and Netw., pp. 243\u2013254 (2000)","DOI":"10.1145\/345910.345953"},{"key":"77_CR2","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: Proc. of the 12th Annual Netw. and Distributed Syst. Security Symp., pp. 29\u201344 (2005)"},{"key":"77_CR3","unstructured":"Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing Vehicular Networks. J. IEEE Wirel. Commun. (2006)"},{"key":"77_CR4","unstructured":"Leinmuller, T., Buttyan, L., et al.: SEVECOM-Secure Vehicle Communication. In: Proc of IST Mob. Summit (2006)"},{"key":"77_CR5","doi-asserted-by":"crossref","unstructured":"Kamat, P., Baliga, A., Trappe, W.: An Identity-Based Security Framework for VANETs. In: Proc of the 3rd Int. Workshop on Vehicular Adhoc Netw., pp. 94\u201395 (2006)","DOI":"10.1145\/1161064.1161083"},{"key":"77_CR6","doi-asserted-by":"crossref","unstructured":"Liu, X., Fang, Z., Shi, L.: Securing Vehicular Ad Hoc netw. IEEE (2007)","DOI":"10.1109\/ICPCA.2007.4365481"},{"key":"77_CR7","unstructured":"Department for Transport, Reported road casualties Great Britain: 2008 Annual Report. Road Casualties G. B. UK (2008)"},{"key":"77_CR8","unstructured":"Caballero-Gil, P., Hernandez-Goya, C., Fuster-Sabater, A.: Differentiated Services to Provide Efficient Node Authentication in VANETs (2009)"},{"key":"77_CR9","unstructured":"Zuowen, T.: A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks. J. of Convergence Inf. Technology (2010)"},{"key":"77_CR10","doi-asserted-by":"crossref","unstructured":"Mahajan, S., Jindal, A.: Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks. Int. J. of Comput. Applications (2010)","DOI":"10.5120\/428-631"},{"key":"77_CR11","unstructured":"Hamad, H., Elkourd, S.: Data Encryption using the dynamic location and speed of mobile node. J. Media and Commun. Stud., pp. 067-075 (2010)"},{"key":"77_CR12","doi-asserted-by":"crossref","unstructured":"Minhas, U.F., et al.: A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks, pp. 407\u2013420. IEEE (2011)","DOI":"10.1109\/TSMCC.2010.2084571"},{"key":"77_CR13","unstructured":"Wasef, A.N., Shen, X.: Mitigating the effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks. In: IEEE ICC Proc. (2011)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31513-8_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:12:10Z","timestamp":1675210330000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-31513-8_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642315121","9783642315138"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31513-8_77","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2012]]}}}