{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:19:54Z","timestamp":1725898794844},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_16","type":"book-chapter","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T20:34:59Z","timestamp":1364330099000},"page":"244-260","source":"Crossref","is-referenced-by-count":11,"title":["Short-Term Linkable Group Signatures with Categorized Batch Verification"],"prefix":"10.1007","author":[{"given":"Lukas","family":"Malina","sequence":"first","affiliation":[]},{"given":"Jordi","family":"Castell\u00e0-Roca","sequence":"additional","affiliation":[]},{"given":"Arnau","family":"Vives-Guasch","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Hajny","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"16_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MWC.2010.5416352","volume":"17","author":"J. Sun","year":"2010","unstructured":"Sun, J., Fang, Y., Zhu, X.: Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. Wireless Com.\u00a017(1), 66\u201373 (2010)","journal-title":"Wireless Com."},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-10838-9_20","volume-title":"Information Security Applications","author":"R. Hussain","year":"2009","unstructured":"Hussain, R., Kim, S., Oh, H.: Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol.\u00a05932, pp. 268\u2013280. Springer, Heidelberg (2009)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-00862-7_21","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"A.L. Ferrara","year":"2009","unstructured":"Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.\u00d8.: Practical Short Signature Batch Verification. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 309\u2013324. Springer, Heidelberg (2009)"},{"key":"16_CR4","unstructured":"Gerlach, M., Festag, A., Leinmuller, T., Goldacker, G., Harsch, C.: Security architecture for vehicular communication. In: The 5th International Workshop on Intelligent Transportation (March 2007)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.: Support of anonymity in VANETs - putting pseudonymity into practice. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong (March 2007)","DOI":"10.1109\/WCNC.2007.625"},{"key":"16_CR6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur.\u00a015, 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Han Ho, P., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology\u00a056, 3442\u20133456 (2007)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 41\u201355. Springer, Heidelberg (2004)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P.H., Shen, X.: An efficient identity-based batch verification scheme for vehicular sensor networks. In: INFOCOM, pp. 246\u2013250. IEEE (2008)","DOI":"10.1109\/INFOCOM.2007.58"},{"issue":"2","key":"16_CR10","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.adhoc.2010.05.005","volume":"9","author":"T.W. Chim","year":"2011","unstructured":"Chim, T.W., Yiu, S.M., Hui, L.C.K., Li, V.O.K.: SPECS: Secure and privacy enhancing communications schemes for VANETs. Ad Hoc Networks\u00a09(2), 189\u2013203 (2011)","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"16_CR11","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/TVT.2009.2038222","volume":"59","author":"L. Zhang","year":"2010","unstructured":"Zhang, L., Wu, Q., Solanas, A., Domingo-Ferrer, J.: A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology\u00a059(4), 1606\u20131617 (2010)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Wasef, A., Shen, X.S.: Efficient group signature scheme supporting batch verification for securing vehicular networks. In: IEEE International Conference on Communications, ICC (2010)","DOI":"10.1109\/ICC.2010.5502136"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-25243-3_10","volume-title":"Information and Communications Security","author":"B. Qin","year":"2011","unstructured":"Qin, B., Wu, Q., Domingo-Ferrer, J., Zhang, L.: Preserving Security and Privacy in Large-Scale VANETs. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol.\u00a07043, pp. 121\u2013135. Springer, Heidelberg (2011)"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1287748.1287752","volume-title":"Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2007","author":"G. Calandriello","year":"2007","unstructured":"Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2007, pp. 19\u201328. ACM, New York (2007)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in VANETs. In: SECON, pp. 1\u20139. IEEE (2009)","DOI":"10.1109\/SAHCN.2009.5168976"},{"issue":"3","key":"16_CR16","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1109\/JSAC.2011.110310","volume":"29","author":"L. Chen","year":"2011","unstructured":"Chen, L., Ng, S.L., Wang, G.: Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications\u00a029(3), 605\u2013615 (2011)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"16_CR17","first-page":"436","volume-title":"International Conference on Multimedia Information Networking and Security","author":"L. Wei","year":"2011","unstructured":"Wei, L., Liu, J., Zhu, T.: On a group signature scheme supporting batch verification for vehicular networks. In: International Conference on Multimedia Information Networking and Security, pp. 436\u2013440. IEEE C. S., Los Alamitos (2011)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Malina, L., Hajny, J.: Accelerated modular arithmetic for low-performance devices. In: The 34th International Conference on Telecommunications and Signal Processing (TSP), pp. 131\u2013135 (August 2011)","DOI":"10.1109\/TSP.2011.6043757"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BFb0054019","volume-title":"Public Key Cryptography","author":"Y. Tsiounis","year":"1998","unstructured":"Tsiounis, Y., Yung, M.: On the Security of ElGamal Based Encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 117\u2013134. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T20:31:20Z","timestamp":1557606680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}