{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:19Z","timestamp":1742914099449,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811679124"},{"type":"electronic","value":"9789811679131"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-7913-1_1","type":"book-chapter","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T13:03:29Z","timestamp":1637067809000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Distribution Key Scheme for Secure Group Management in VANET Using Polynomial Interpolation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7945-4616","authenticated-orcid":false,"given":"Ankit","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7201-6381","authenticated-orcid":false,"given":"Kamred Udham","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4746-3179","authenticated-orcid":false,"given":"Sun-Yuan","family":"Hsieh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7722-2398","authenticated-orcid":false,"given":"V. D. Ambeth","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9925-8137","authenticated-orcid":false,"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"56656","DOI":"10.1109\/ACCESS.2019.2913682","volume":"7","author":"L Xie","year":"2019","unstructured":"Xie, L., Ding, Y., Yang, H., Wang, X.: Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-VANETs. IEEE Access 7, 56656\u201356666 (2019)","journal-title":"IEEE Access"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"4834","DOI":"10.1109\/TVT.2019.2905522","volume":"68","author":"J Yang","year":"2019","unstructured":"Yang, J., Weng, N., Cheng, J., Ni, X., Lin, X., Shen, X.: DeQoS attack: degrading quality of service in VANETs and its mitigation. IEEE Trans. Veh. Technol. 68, 4834\u20134845 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"47258","DOI":"10.1109\/ACCESS.2018.2864111","volume":"6","author":"C Iwendi","year":"2018","unstructured":"Iwendi, C., Uddin, M., Ansere, J.A., Nkurunziza, P., Anajemba, J.H., Bashir, A.K.: On detection of sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access 6, 47258\u201347267 (2018)","journal-title":"IEEE Access"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"58241","DOI":"10.1109\/ACCESS.2018.2890736","volume":"7","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Chen, X.: Data security sharing and storage based on a consortium blockchain in a vehicular Ad-hoc network. IEEE Access 7, 58241\u201358254 (2019)","journal-title":"IEEE Access"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"2482","DOI":"10.1109\/ACCESS.2019.2962387","volume":"8","author":"H Tan","year":"2020","unstructured":"Tan, H., Chung, I.: Secure authentication and key management with blockchain in VANETs. IEEE Access 8, 2482\u20132498 (2020)","journal-title":"IEEE Access"},{"key":"1_CR6","first-page":"148","volume":"4","author":"T Zhang","year":"2018","unstructured":"Zhang, T., Zhu, Q.: Distributed privacy-preserving collaborative intrusion detection systems for VANETs. IEEE Trans. Signal Inf. Process. Netw. 4, 148\u2013161 (2018)","journal-title":"IEEE Trans. Signal Inf. Process. Netw."},{"issue":"7","key":"1_CR7","doi-asserted-by":"publisher","first-page":"6647","DOI":"10.1109\/JIOT.2020.2975084","volume":"7","author":"J Guo","year":"2020","unstructured":"Guo, J.: TROVE: a context-awareness trust model for VANETs using reinforcement learning. IEEE Internet Things J. 7(7), 6647\u20136662 (2020)","journal-title":"IEEE Internet Things J."},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"62785","DOI":"10.1109\/ACCESS.2019.2915794","volume":"7","author":"Z Wei","year":"2019","unstructured":"Wei, Z., Li, J., Wang, X., Gao, C.: A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing. IEEE Access 7, 62785\u201362793 (2019)","journal-title":"IEEE Access"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"5836","DOI":"10.1109\/TVT.2020.2972923","volume":"69","author":"Z Ma","year":"2020","unstructured":"Ma, Z., Zhang, J., Guo, Y., Liu, Y., Liu, X., He, W.: An efficient decentralized key management mechanism for VANET with blockchain. IEEE Trans. Veh. Technol. 69, 5836\u20135849 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","volume":"20","author":"Z Lu","year":"2019","unstructured":"Lu, Z., Qu, G., Liu, Z.: A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans. Intell. Transp. Syst. 20, 760\u2013776 (2019)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"1_CR11","doi-asserted-by":"publisher","first-page":"5232","DOI":"10.1109\/TVT.2020.2981127","volume":"69","author":"S Tangade","year":"2020","unstructured":"Tangade, S., Manvi, S.S., Lorenz, P.: Trust management scheme based on hybrid cryptography for secure communications in VANETs. IEEE Trans. Veh. Technol. 69(5), 5232\u20135243 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"74260","DOI":"10.1109\/ACCESS.2018.2883426","volume":"6","author":"H Tan","year":"2018","unstructured":"Tan, H., Gui, Z., Chung, I.: A secure and efficient certificateless authentication scheme with unsupervised anomaly detection in VANETs. IEEE Access 6, 74260\u201374276 (2018)","journal-title":"IEEE Access"},{"issue":"6","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/JSAC.2020.2986617","volume":"38","author":"J Cui","year":"2020","unstructured":"Cui, J., Wei, L., Zhong, H., Zhang, J., Xu, Y., Liu, L.: Edge computing in VANETs-An efficient and privacy-preserving cooperative downloading scheme. IEEE J. Sel. Areas Commun. 38(6), 1191\u20131204 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"7","key":"1_CR14","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1109\/TITS.2016.2614580","volume":"18","author":"MA Javed","year":"2017","unstructured":"Javed, M.A., Hamida, E.B.: On the interrelation of security, QoS, and safety in cooperative ITS. IEEE Trans. Intell. Transp. Syst. 18(7), 1943\u20131957 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"1_CR15","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TITS.2016.2579162","volume":"18","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 18(3), 516\u2013526 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-7913-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,4]],"date-time":"2022-02-04T11:28:42Z","timestamp":1643974122000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-7913-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811679124","9789811679131"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-7913-1_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/socialsec2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,32","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,78","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}