{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:46:02Z","timestamp":1743097562824,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811575297"},{"type":"electronic","value":"9789811575303"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-7530-3_12","type":"book-chapter","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:50:27Z","timestamp":1597333827000},"page":"178-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Security Vehicle Network Organization Method for Railway Freight Train Based on Lightweight Authentication and Property Verification"],"prefix":"10.1007","author":[{"given":"Congdong","family":"Lv","sequence":"first","affiliation":[]},{"given":"Yucai","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,14]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/s11668-018-0565-7","volume":"19","author":"R Sarkar","year":"2019","unstructured":"Sarkar, R., Pathak, S., Kela, D.H.: Root cause analysis of low impact toughness of cast steel yokes used in railway freight cars. J. Fail. Anal. Prev. 19(1), 76\u201384 (2019)","journal-title":"J. Fail. Anal. Prev."},{"key":"12_CR2","first-page":"46","volume":"10","author":"O Abuobidalla","year":"2019","unstructured":"Abuobidalla, O., Chen, M., Chauhan, S.: A matheuristic method for planning railway freight transportation with hazardous materials. J. Rail Transp. Plan. Manag. 10, 46\u201361 (2019)","journal-title":"J. Rail Transp. Plan. Manag."},{"issue":"9","key":"12_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MCOM.001.1800957","volume":"57","author":"D Ludicke","year":"2019","unstructured":"Ludicke, D., Lehner, A.: Train communication networks and prospects. IEEE Commun. Mag. 57(9), 39\u201343 (2019)","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"12_CR4","first-page":"1017","volume":"40","author":"XD Ma","year":"2017","unstructured":"Ma, X.D., Li, H., Ma, J.F., et al.: Lightweight position awareness recommendation system privacy protection framework. Chin. J. Comput. 40(5), 1017\u20131030 (2017)","journal-title":"Chin. J. Comput."},{"issue":"4","key":"12_CR5","first-page":"110","volume":"38","author":"Y Xin","year":"2017","unstructured":"Xin, Y., Feng, X., Li, T.T.: Position-dependent lightweight Sybil attack detection method in VANET. J. Commun. 38(4), 110\u2013119 (2017)","journal-title":"J. Commun."},{"key":"12_CR6","unstructured":"Wei, G.J., Qin, Y.L., Zhang, H.G.: ECC-based lightweight radio frequency identification security authentication protocol. J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.) (1), 49\u201352 (2018)"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.cose.2015.05.004","volume":"55","author":"P Gope","year":"2015","unstructured":"Gope, P., Hwang, T.: A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Secur. 55, 271\u2013280 (2015)","journal-title":"Comput. Secur."},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"2615","DOI":"10.1109\/TVT.2016.2577018","volume":"66","author":"A Abdallah","year":"2017","unstructured":"Abdallah, A., Shen, X.S.: Lightweight authentication and privacy-preserving scheme for V2G connections. IEEE Trans. Veh. Technol. 66(3), 2615\u20132629 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.future.2018.02.034","volume":"84","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood, D., Nikooghadam, M.: Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Gener. Comput. Syst. 84, 47\u201357 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Arafin, M.T., Gao, M., Qu, G.: VOLtA: voltage over-scaling based lightweight authentication for IoT applications. In: 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 336\u2013341. IEEE (2017)","DOI":"10.1109\/ASPDAC.2017.7858345"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.comnet.2016.02.007","volume":"99","author":"C Lai","year":"2016","unstructured":"Lai, C., Lu, R., Zheng, D., et al.: GLARM: group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput. Netw. 99, 66\u201381 (2016)","journal-title":"Comput. Netw."},{"issue":"5","key":"12_CR12","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1049\/iet-ifs.2015.0390","volume":"10","author":"AG Reddy","year":"2016","unstructured":"Reddy, A.G., Yoon, E.J., Das, A.K., et al.: Lightweight authentication with key-agreement protocol for mobile network environment using smart cards. IET Inf. Secur. 10(5), 272\u2013282 (2016)","journal-title":"IET Inf. Secur."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-7530-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:55:45Z","timestamp":1597334145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-7530-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811575297","9789811575303"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-7530-3_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OJS\/PKP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}