{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:16:32Z","timestamp":1757542592320,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813368347"},{"type":"electronic","value":"9789813368354"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-33-6835-4_6","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T09:20:32Z","timestamp":1612430432000},"page":"80-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network"],"prefix":"10.1007","author":[{"given":"Murtadha A.","family":"Alazzawi","sequence":"first","affiliation":[]},{"given":"Hasanain A. H.","family":"Al-behadili","sequence":"additional","affiliation":[]},{"given":"Mohsin N.","family":"Srayyih Almalki","sequence":"additional","affiliation":[]},{"given":"Aqeel Luaibi","family":"Challoob","sequence":"additional","affiliation":[]},{"given":"Mahmood A.","family":"Al-shareeda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"issue":"12","key":"6_CR1","first-page":"6121","volume":"13","author":"MA Alazzawi","year":"2019","unstructured":"Alazzawi, M.A., Lu, H., Yassin, A.A., Chen, K.: Robust conditional privacy-preserving authentication based on pseudonym root with cuckoo filter in vehicular ad hoc networks. KSII Trans. Internet Inform. Syst. 13(12), 6121\u201344 (2019)","journal-title":"KSII Trans. Internet Inform. Syst."},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.vehcom.2019.100228","volume":"22","author":"I Ali","year":"2020","unstructured":"Ali, I., Li, F.: An efficient conditional privacy-preserving authentication scheme for Vehicle-To-Infrastructure communication in VANETs. Veh. Commun. 22, 1\u201315 (2020). https:\/\/doi.org\/10.1016\/j.vehcom.2019.100228","journal-title":"Veh. Commun."},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"150914","DOI":"10.1109\/ACCESS.2020.3017018","volume":"8","author":"MA Al-Shareeda","year":"2020","unstructured":"Al-Shareeda, M.A., Anbar, M., Manickam, S., Yassin, A.A.: Vppcs: vanet-based privacy-preserving communication scheme. IEEE Access 8, 150914\u2013150928 (2020)","journal-title":"IEEE Access"},{"issue":"7","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/JPROC.2010.2101990","volume":"99","author":"CF Mecklenbrauker","year":"2011","unstructured":"Mecklenbrauker, C.F., Molisch, A.F., Karedal, J., Tufvesson, F., Paier, A., Bernad\u00f3, L., et al.: Vehicular channel characterization and its implications for wireless system design and performance. Proc. IEEE 99(7), 1189\u2013212 (2011)","journal-title":"Proc. IEEE"},{"key":"6_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3021731","author":"MA Al-shareeda","year":"2020","unstructured":"Al-shareeda, M.A., Anbar, M., Hasbullah, I.H., Manickam, S.: Survey of authentication and privacy schemes in vehicular ad hoc networks. IEEE Sens. J. (2020). https:\/\/doi.org\/10.1109\/JSEN.2020.3021731","journal-title":"IEEE Sens. J."},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"170507","DOI":"10.1109\/ACCESS.2020.3024587","volume":"8","author":"MA Al-Shareeda","year":"2020","unstructured":"Al-Shareeda, M.A., Anbar, M., Alazzawi, M.A., Manickam, S., Al-Hiti, A.S.: LSWBVM: a lightweight security without using batch verification method scheme for a vehicle ad hoc network. IEEE Access 8, 170507\u2013170518 (2020)","journal-title":"IEEE Access"},{"issue":"10","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.3390\/sym12101687","volume":"12","author":"MA Al-shareeda","year":"2020","unstructured":"Al-shareeda, M.A., Anbar, M., Manickam, S., Hasbullah, I.H.: An efficient identity-based conditional privacy-preserving authentication scheme for secure communication in a vehicular ad hoc network. Symmetry 12(10), 1687 (2020)","journal-title":"Symmetry"},{"key":"6_CR8","first-page":"377","volume":"55","author":"C Hsu","year":"2009","unstructured":"Hsu, C., Liang, C., Ke, L., Huang, F.: Verification of on-line vehicle collision avoidance warning system using DSRC. World Acad. Sci. Eng. 55, 377\u201383 (2009)","journal-title":"World Acad. Sci. Eng."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Miller, H.J., Shaw, S.-L.: Geographic Information Systems for Transportation: Principles and Applications. Oxford University Press on Demand, Oxford (2001)","DOI":"10.1093\/oso\/9780195123944.001.0001"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Alazzawi, M.A., Lu, H., Yassin, A.A., Chen, K.: Efficient conditional anonymity with message integrity and authentication in a vehicular ad-hoc network. IEEE Access 7, 71424\u201371435 (2019)","DOI":"10.1109\/ACCESS.2019.2919973"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11235-016-0222-y","volume":"65","author":"Y Xie","year":"2017","unstructured":"Xie, Y., Wu, L., Shen, J., Alelaiwi, A.: EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs. Telecommun. Syst. 65(2), 229\u201340 (2017)","journal-title":"Telecommun. Syst."},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"issue":"7","key":"6_CR13","doi-asserted-by":"publisher","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. Trans. Veh. Technol. 59(7), 3589\u2013603 (2010)","journal-title":"Trans. Veh. Technol."},{"issue":"6","key":"6_CR14","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442\u20133456 (2007)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (2007)","DOI":"10.1145\/1287748.1287752"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"key":"6_CR17","unstructured":"Zhao, Z.-M.: ID-based weak blind signature from bilinear pairings. Netw. Secur. 7(2), 265\u2013268 (2008)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, H., Lin, X., Lu, R., Ho, P.-H., Shen, X.: AEMA: an aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In: 2008 IEEE International Conference on Communications. IEEE (2008)","DOI":"10.1109\/ICC.2008.278"},{"issue":"8","key":"6_CR19","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1007\/s11276-011-0383-2","volume":"17","author":"C Zhang","year":"2011","unstructured":"Zhang, C., Ho, P.-H., Tapolcai, J.: On batch verification with group testing for vehicular communications. Wirel. Netw. 17(8), 1851\u20131865 (2011)","journal-title":"Wirel. Netw."},{"issue":"6","key":"6_CR20","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","volume":"19","author":"C-C Lee","year":"2013","unstructured":"Lee, C.-C., Lai, Y.-M.: Toward a secure batch verification with group testing for VANET. Wirel. Netw. 19(6), 1441\u20131449 (2013)","journal-title":"Wirel. Netw."},{"issue":"5","key":"6_CR21","first-page":"355","volume":"16","author":"Z Jianhong","year":"2014","unstructured":"Jianhong, Z., Min, X., Liying, L.: On the security of a secure batch verification with group testing for VANET. Int. J. Netw. Secur. 16(5), 355\u2013362 (2014)","journal-title":"Int. J. Netw. Secur."},{"issue":"6","key":"6_CR22","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/TST.2016.7787005","volume":"21","author":"H Zhong","year":"2016","unstructured":"Zhong, H., Wen, J., Cui, J., Zhang, S.: Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET. Tsinghua Sci. 21(6), 620\u2013629 (2016)","journal-title":"Tsinghua Sci."},{"issue":"5","key":"6_CR23","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TITS.2015.2502322","volume":"17","author":"N-W Lo","year":"2015","unstructured":"Lo, N.-W., Tsai, J.-L.: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings. IEEE Trans. Intell. Transp. Syst. 17(5), 1319\u20131328 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"6_CR24","doi-asserted-by":"crossref","first-page":"155014771770089","DOI":"10.1177\/1550147717700899","volume":"13","author":"L Wu","year":"2017","unstructured":"Wu, L., Fan, J., Xie, Y., Wang, J., Liu, Q.: Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks. Int. J. Distrib. Sens. Netw. 13(3), 1550147717700899 (2017)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1007\/s11276-019-02039-x","volume":"26","author":"M Bayat","year":"2020","unstructured":"Bayat, M., Pournaghi, M., Rahimi, M., Barmshoory, M.: NERA: a new and efficient RSU based authentication scheme for VANETs. Wirel. Netw. 26, 3083\u20133098 (2020)","journal-title":"Wirel. Netw."},{"issue":"11","key":"6_CR26","doi-asserted-by":"publisher","first-page":"10283","DOI":"10.1109\/TVT.2017.2718101","volume":"66","author":"J Cui","year":"2017","unstructured":"Cui, J., Zhang, J., Zhong, H., Xu, Y.: SPACF: a secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans. Veh. Technol. 66(11), 10283\u201310295 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"2241","DOI":"10.1109\/ACCESS.2017.2782672","volume":"6","author":"H Zhong","year":"2017","unstructured":"Zhong, H., Huang, B., Cui, J., Xu, Y., Liu, L.: Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access 6, 2241\u20132250 (2017)","journal-title":"IEEE Access"},{"issue":"12","key":"6_CR28","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inform. Forensics Secur. 10(12), 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inform. Forensics Secur."}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-6835-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T15:36:29Z","timestamp":1724427389000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-6835-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789813368347","9789813368354"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-6835-4_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}