{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:40:21Z","timestamp":1761324021136},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2015,6,9]],"date-time":"2015-06-09T00:00:00Z","timestamp":1433808000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s00500-015-1737-y","type":"journal-article","created":{"date-parts":[[2015,6,8]],"date-time":"2015-06-08T03:25:32Z","timestamp":1433733932000},"page":"3335-3346","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks"],"prefix":"10.1007","volume":"20","author":[{"given":"Yi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jie","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,9]]},"reference":[{"key":"1737_CR1","unstructured":"(2006) IEEE trial-use standard for wireless access in vehicular environments security services for applications and management messages, IEEE Std. 1609.2-2006"},{"key":"1737_CR2","unstructured":"(2009) Standard specification for telecommunications and information exchange between roadside and vehicle systems\u20145\u00a0GHz band dedicated short range communications (DSRC) medium access control (MAC) and physical layer (PHY) specifications, ASTM E2213\u201303. http:\/\/www.iteris.com\/itsarch\/html\/standard\/dsrc5ghz.htm"},{"key":"1737_CR3","doi-asserted-by":"crossref","unstructured":"Boyen X, Waters B (2006) Compact group signatures without random oracles. In: Proceeding of Eurocrypt\u201906, Lecture Notes in Computer Science, vol. 4004, Springer, pp 427\u2013444","DOI":"10.1007\/11761679_26"},{"issue":"6","key":"1737_CR4","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TDSC.2010.58","volume":"8","author":"G Calandriello","year":"2011","unstructured":"Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2011) On the performance of secure vehicular communication systems. IEEE Trans Dependable Secur Comput 8(6):898\u2013912","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1737_CR5","doi-asserted-by":"crossref","unstructured":"Calandriello G, Papadimitratos P, Lioy A, Hubaux J-P (2007) Efficient and robust pseudonymous authentication in VANET. Montr\u00e9al, QC, Canada. In: Proceeding of ACM international workshop on vehicular Ad Hoc networks-VANET, pp 19\u201328","DOI":"10.1145\/1287748.1287752"},{"key":"1737_CR6","doi-asserted-by":"crossref","unstructured":"Chaum D, Pedersen TP (1993) Wallet databases with observers. In: Proceeding of Crypto 1992. Lecture Notes in Computer Science 740:89\u2013105","DOI":"10.1007\/3-540-48071-4_7"},{"key":"1737_CR7","unstructured":"Damg\u00e5rd IB (1991) Towards practical public key systems secure against chosen ciphertext attacks. In: Proceeding of Crypto\u201991, Lecture Notes in Computer Science, vol. 576, Springer, pp 445\u2013456"},{"issue":"4","key":"1737_CR8","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TVT.2008.2002581","volume":"58","author":"V Daza","year":"2009","unstructured":"Daza V, Domingo-Ferrer J, Seb\u00e9 F, Viejo A (2009) Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Trans Veh Technol 58(4):1876\u20131886","journal-title":"IEEE Trans Veh Technol"},{"key":"1737_CR9","doi-asserted-by":"crossref","unstructured":"Galbraith SD, Paterson KG, Smart NP (2008) Pairings for cryptographers. Discrete Applied Mathematics. 156(16):3113\u20133121","DOI":"10.1016\/j.dam.2007.12.010"},{"issue":"3","key":"1737_CR10","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/JSAC.2011.110309","volume":"29","author":"JJ Haas","year":"2011","unstructured":"Haas JJ, Hu Y-C, Laberteaux KP (2011) Efficient certificate revocation list organization and distribution. IEEE J Sel Areas Commun 29(3):595\u2013604","journal-title":"IEEE J Sel Areas Commun"},{"key":"1737_CR11","unstructured":"Hartmut S (2005) Organic computing C A new vision for distributed embedded systems. In: Proceeding of ISORC\u201905, IEEE, IEEE Computer Society, pp 201\u2013203"},{"key":"1737_CR12","unstructured":"http:\/\/www.car-2-car.org\/ . 2010"},{"key":"1737_CR13","unstructured":"http:\/\/www.network-on-wheels.de\/ . 2009"},{"key":"1737_CR14","unstructured":"http:\/\/www.sevecom.org\/ . 2010"},{"issue":"3","key":"1737_CR15","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1109\/TITS.2011.2156790","volume":"12","author":"D Huang","year":"2011","unstructured":"Huang D, Misra S, Verma M, Xue G (2011) PACP: an efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Trans Intell Transp Syst 12(3):736\u2013746","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1737_CR16","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"A Joux","year":"2004","unstructured":"Joux A (2004) A one round protocol for tripartite Diffie\u2013Hellman. J Cryptol 17:263\u2013276","journal-title":"J Cryptol"},{"issue":"3","key":"1737_CR17","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1002\/sec.27","volume":"1","author":"P Kamat","year":"2008","unstructured":"Kamat P, Baliga A, Trappe W (2008) Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. Secur Commun Netw 1(3):233\u2013244","journal-title":"Secur Commun Netw"},{"key":"1737_CR18","doi-asserted-by":"crossref","unstructured":"Kamat P, Baliga A, Trappe W (2006) An identity-based security framework for VANETs. In: Proceeding of third ACM Int\u2019l workshop vehicular Ad Hoc networks (VANET\u201906), pp 94\u201395","DOI":"10.1145\/1161064.1161083"},{"key":"1737_CR19","doi-asserted-by":"crossref","unstructured":"Kocher PC (1996) Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS, and other systems. In: Proceeding of Crypto 96, LNCS 1109, Springer, pp 104\u2013113","DOI":"10.1007\/3-540-68697-5_9"},{"issue":"6","key":"1737_CR20","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442\u20133456","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1737_CR21","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R Lu","year":"2012","unstructured":"Lu R, Lin X, Luan TH, Liang X, Shen X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans Veh Technol 61(1):86\u201396","journal-title":"IEEE Trans Veh Technol"},{"key":"1737_CR22","doi-asserted-by":"crossref","unstructured":"Nguyen L, Safavi-Naini R (2005) Dynamic $$k$$ k -times anonymous authentication. In: Proceeding of ACNS 2005, LNCS 3531, Springer, pp 318\u2013333","DOI":"10.1007\/11496137_22"},{"key":"1737_CR23","doi-asserted-by":"crossref","unstructured":"Qin B, Wu Q, Domingo-Ferrer J, Zhang L (2011) Preserving security and privacy in large-scale VANETs. In: Proceeding of ICICS 2011, LNCS 7043, Springer, pp 121\u2013135","DOI":"10.1007\/978-3-642-25243-3_10"},{"issue":"1","key":"1737_CR24","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39\u201368","journal-title":"J Comput Secur"},{"issue":"1","key":"1737_CR25","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MSPEC.2015.6995635","volume":"52","author":"PE Ross","year":"2015","unstructured":"Ross PE (2015) Thus spoke the autobahn. IEEE Spectr 52(1):52\u201355","journal-title":"IEEE Spectr"},{"key":"1737_CR26","unstructured":"Schnorr CP (1990) Efficient identification and signatures for smart cards. In: Proceeding of Crypto\u201989, Lecture Notes in Computer Science, vol. 435, Springer, Berlin, pp 235\u2013251"},{"key":"1737_CR27","doi-asserted-by":"crossref","unstructured":"Shamir A (1979) How to share a secret. Communications of the ACM 22:612\u2013613","DOI":"10.1145\/359168.359176"},{"key":"1737_CR28","unstructured":"Shamir A (1984) Identity based cryptosystems and signature schemes. In: Proceeding of Crypto 84, LNCS 196, Springer, pp 47\u201353"},{"key":"1737_CR29","doi-asserted-by":"crossref","unstructured":"Standaert F, Malkin T, Yung M (2009) A unified framework for the analysis of side-channel key recovery attacks. In: Proceeding of Eurocrypt 2009, LNCS 5479, Springer, pp 443\u2013461","DOI":"10.1007\/978-3-642-01001-9_26"},{"issue":"9","key":"1737_CR30","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","volume":"21","author":"J Sun","year":"2010","unstructured":"Sun J, Zhang C, Zhang Y, Fang Y (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans Parallel Distrib Syst 21(9):1227\u20131239","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"9","key":"1737_CR31","doi-asserted-by":"crossref","first-page":"5190","DOI":"10.1109\/TVT.2009.2028145","volume":"58","author":"E Berg van den","year":"2009","unstructured":"van den Berg E, Zhang T, Pietrowicz S (2009) Blend-in: a privacy-enhancing certificate-selection method for vehicular communication. IEEE Trans Veh Technol 58(9):5190\u20135198","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"1737_CR32","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MWC.2010.5601954","volume":"17","author":"A Wasef","year":"2010","unstructured":"Wasef A, Lu R, Lin X, Shen X (2010) Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE Wirel Commun 17(5):22\u201328","journal-title":"IEEE Wirel Commun"},{"issue":"2","key":"1737_CR33","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TVT.2009.2028893","volume":"59","author":"A Wasef","year":"2010","unstructured":"Wasef A, Jiang Y, Shen X (2010) DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans Veh Technol 59(2):533\u2013549","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"1737_CR34","doi-asserted-by":"crossref","first-page":"5214","DOI":"10.1109\/TVT.2009.2023662","volume":"58","author":"A Wasef","year":"2009","unstructured":"Wasef A, Shen X (2009) EDR: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans Veh Technol 58(9):5214\u20135224","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1737_CR35","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TMC.2011.246","volume":"12","author":"A Wasef","year":"2013","unstructured":"Wasef A, Shen X (2013) EMAP: expedite message authentication protocol for vehicular Ad Hoc networks. IEEE Trans Mobile Comput 12(1):78\u201389","journal-title":"IEEE Trans Mobile Comput"},{"key":"1737_CR36","unstructured":"WHO 2009 report (2010) http:\/\/whqlibdoc.who.int\/publications\/2009\/9789241563840_eng"},{"issue":"2","key":"1737_CR37","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TVT.2009.2034669","volume":"59","author":"Q Wu","year":"2010","unstructured":"Wu Q, Domingo-Ferrer J, Gonz\u00e1lez-Nicol\u00e1s U (2010) Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications. IEEE Trans Veh Technol 59(2):559\u2013573","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"1737_CR38","doi-asserted-by":"crossref","first-page":"1606","DOI":"10.1109\/TVT.2009.2038222","volume":"59","author":"L Zhang","year":"2010","unstructured":"Zhang L, Wu Q, Solanas A, Domingo-Ferrer J (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 59(4):1606\u20131617","journal-title":"IEEE Trans Veh Technol"},{"key":"1737_CR39","doi-asserted-by":"crossref","unstructured":"Zhang C, Lu R, Lin X, Ho P, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. Proc. IEEE INFOCOM, pp 246\u2013250","DOI":"10.1109\/INFOCOM.2008.58"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1737-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1737-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1737-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T21:43:48Z","timestamp":1559079828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1737-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,9]]},"references-count":39,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["1737"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1737-y","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,9]]}}}