{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:52Z","timestamp":1742913592076,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811308956"},{"type":"electronic","value":"9789811308963"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-0896-3_57","type":"book-chapter","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T11:06:46Z","timestamp":1528715206000},"page":"574-587","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Cloud Based Three Layer Key Management Scheme for VANET"],"prefix":"10.1007","author":[{"given":"Wanan","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Bin","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"issue":"15","key":"57_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","volume":"44","author":"RG Engoulou","year":"2014","unstructured":"Engoulou, R.G., Pierre, S.: VANET security surveys. Comput. Commun. 44(15), 1\u201313 (2014)","journal-title":"Comput. Commun."},{"key":"57_CR2","unstructured":"Cunha, F., Boukerche, A., Viana, L.V.A., Loureiro, A.A.F.: Data communication in vanets: a survey, challenges and applications (2014)"},{"key":"57_CR3","unstructured":"Meshram, S.S., Golait, P.M., Ghodichor, P.M.: Inter-infrastructure and vehicle communication for traffic information sharing in vanet. IOSR J. Comput. Sci. (IOSR-JCE), 5\u201312 (2014). \nwww.iosrjournals.org"},{"issue":"2","key":"57_CR4","doi-asserted-by":"publisher","first-page":"2803","DOI":"10.1016\/j.comcom.2007.12.005","volume":"31","author":"CT Li","year":"2008","unstructured":"Li, C.T., Hwang, M.S., Chu, Y.P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(2), 2803\u20132814 (2008)","journal-title":"Comput. Commun."},{"key":"57_CR5","unstructured":"De Fuentes, J.M., Gonzlez-Tablas, A.I., Ribagorda, A.: Overview of security issues in vehicular ad-hoc Networks. In: Handbook of Research on Mobility and Computing. IGI Global, pp. 1\u201317 (2010). \nwww.igi-global.com"},{"key":"57_CR6","first-page":"1652","volume":"2","author":"U Singh","year":"2011","unstructured":"Singh, U., Singh, P.: Review of solutions for securing the vehicular networks. Int. J. comput. Technol. Appl. 2, 1652\u20131656 (2011)","journal-title":"Int. J. comput. Technol. Appl."},{"issue":"1","key":"57_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MITP.2004.1265539","volume":"6","author":"J Blum","year":"2004","unstructured":"Blum, J., Eskandarian, A.: The threat of intelligent collisions. IT Prof. 6(1), 24\u201329 (2004)","journal-title":"IT Prof."},{"issue":"1","key":"57_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"key":"57_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., Ho, P.H.: Rise: an efficient Rsu-aided message authentication scheme in vehicular communication networks. In: ICC. Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19\u201323 May 2008, pp. 1451\u20131457 (2008)","DOI":"10.1109\/ICC.2008.281"},{"key":"57_CR10","first-page":"1","volume":"35","author":"HT Wu","year":"2011","unstructured":"Wu, H.T., Hsieh, W.S.: RSU-based message authentication for vehicular ad-hoc networks. Springer Multimed. Tools Appl. 35, 1\u201313 (2011)","journal-title":"Springer Multimed. Tools Appl."},{"key":"57_CR11","unstructured":"Frey, G., Muller, M., Riick, H.: The Tate pairing and the discrete logarithm applied to elliptic curve"},{"key":"57_CR12","unstructured":"Menezes, A., Okamoto, T., VanstoneL, S.: Reducing elliptic curve logarithms to logarithms in a finite field"},{"issue":"11","key":"57_CR13","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"57_CR14","unstructured":"Sun, B., Yu, B.: The three-layered group key management architecture for MANET. In: 11th International Conference on Advanced Communication Technology, ICACT 2009, 15\u201318 February 2009, vol. 2, pp. 1378\u20131381 (2009)"},{"issue":"1","key":"57_CR15","first-page":"6","volume":"10","author":"WA Xiong","year":"2011","unstructured":"Xiong, W.A., Gong, Y.H.: Secure and highly efficient three level key management scheme for MANET. WSEAS Trans. Comput. 10(1), 6\u201315 (2011)","journal-title":"WSEAS Trans. Comput."}],"container-title":["Communications in Computer and Information Science","Geo-Spatial Knowledge and Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-0896-3_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T13:00:40Z","timestamp":1537448440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-0896-3_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811308956","9789811308963"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-0896-3_57","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"GSKI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Geo-Spatial Knowledge and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chiang Mai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gski2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.grmse2017.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}