{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:23:30Z","timestamp":1772119410462,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T00:00:00Z","timestamp":1688428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T00:00:00Z","timestamp":1688428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s00500-023-08634-7","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T09:05:00Z","timestamp":1688979900000},"page":"13853-13862","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Intelligent algorithms in privacy-preserving authentication schemes and traceability with accuracy in VANETs for smart transportation"],"prefix":"10.1007","volume":"28","author":[{"given":"Rishi","family":"Shikka","sequence":"first","affiliation":[]},{"given":"R.","family":"Kamalraj","sequence":"additional","affiliation":[]},{"given":"Pradeep Kumar","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Kamal","family":"Sutariya","sequence":"additional","affiliation":[]},{"given":"Syed Rashid","family":"Anwar","sequence":"additional","affiliation":[]},{"given":"Arvind","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,4]]},"reference":[{"issue":"3","key":"8634_CR1","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.eij.2020.12.002","volume":"22","author":"B Alaya","year":"2021","unstructured":"Alaya B (2021) Efficient privacy-preservation scheme for securing urban P2P VANET networks. Egypt Inform J 22(3):317\u2013328","journal-title":"Egypt Inform J"},{"issue":"2","key":"8634_CR2","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TVT.2021.3050399","volume":"70","author":"I Ali","year":"2021","unstructured":"Ali I, Chen Y, Ullah N, Kumar R, He W (2021) An efficient and provably secure ECC-based conditional privacy-preserving authentication for vehicle-to-vehicle communication in VANETs. IEEE Trans Veh Technol 70(2):1278\u20131291","journal-title":"IEEE Trans Veh Technol"},{"key":"8634_CR3","doi-asserted-by":"crossref","unstructured":"Al-shareeda MMA, Anbar M, Alazzawi MA, Manickam S, Hasbullah IH (2020) Security schemes based conditional privacy-preserving in vehicular ad hoc networks.\u00a0Indonesian J Electr Eng Comput Sci 21(1)","DOI":"10.11591\/ijeecs.v21.i1.pp479-488"},{"key":"8634_CR4","volume":"26","author":"M Arif","year":"2020","unstructured":"Arif M, Wang G, Balas VE, Geman O, Castiglione A, Chen J (2020) SDN based communications privacy-preserving architecture for VANETs using fog computing. Veh Commun 26:100265","journal-title":"Veh Commun"},{"issue":"12","key":"8634_CR5","doi-asserted-by":"publisher","first-page":"10354","DOI":"10.1109\/JIOT.2021.3121552","volume":"9","author":"Y Chen","year":"2021","unstructured":"Chen Y, Chen J (2021) Cpp-clas: efficient and conditional privacy-preserving certificateless aggregate signature scheme for vanets. IEEE Internet Things J 9(12):10354\u201310365","journal-title":"IEEE Internet Things J"},{"key":"8634_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102158","volume":"117","author":"X Feng","year":"2021","unstructured":"Feng X, Shi Q, Xie Q, Liu L (2021) An efficient privacy-preserving authentication model based on blockchain for VANETs. J Syst Architect 117:102158","journal-title":"J Syst Architect"},{"key":"8634_CR7","doi-asserted-by":"publisher","first-page":"102782","DOI":"10.1016\/j.adhoc.2022.102782","volume":"128","author":"S Goudarzi","year":"2022","unstructured":"Goudarzi S, Soleymani SA, Anisi MH, Azgomi MA, Movahedi Z, Kama N, Khan MK (2022) A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Netw 128:102782","journal-title":"Ad Hoc Netw"},{"key":"8634_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102633","volume":"129","author":"R Guo","year":"2022","unstructured":"Guo R, Xu L, Li X, Zhang Y, Li X (2022) An efficient certificateless ring signcryption scheme with conditional privacy-preserving in VANETs. J Syst Architect 129:102633","journal-title":"J Syst Architect"},{"issue":"9","key":"8634_CR9","doi-asserted-by":"publisher","first-page":"1358","DOI":"10.3390\/electronics9091358","volume":"9","author":"GP Joshi","year":"2020","unstructured":"Joshi GP, Perumal E, Shankar K, Tariq U, Ahmad T, Ibrahim A (2020) Toward blockchain-enabled privacy-preserving data transmission in cluster-based vehicular networks. Electronics 9(9):1358","journal-title":"Electronics"},{"issue":"3","key":"8634_CR10","first-page":"270","volume":"6","author":"N Jyothi","year":"2022","unstructured":"Jyothi N, Patil R (2022) A fuzzy-based trust evaluation framework for efficient privacy preservation and secure authentication in VANET. J Inf Telecommun 6(3):270\u2013288","journal-title":"J Inf Telecommun"},{"issue":"3","key":"8634_CR11","doi-asserted-by":"publisher","first-page":"3547","DOI":"10.1109\/JSYST.2020.2991168","volume":"14","author":"X Li","year":"2020","unstructured":"Li X, Liu T, Obaidat MS, Wu F, Vijayakumar P, Kumar N (2020) A lightweight privacy-preserving authentication protocol for VANETs. IEEE Syst J 14(3):3547\u20133557","journal-title":"IEEE Syst J"},{"key":"8634_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100411","volume":"41","author":"P Mundhe","year":"2021","unstructured":"Mundhe P, Verma S, Venkatesan S (2021) A comprehensive survey on authentication and privacy-preserving schemes in VANETs. Comput Sci Review 41:100411","journal-title":"Comput Sci Review"},{"key":"8634_CR13","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.comcom.2022.06.024","volume":"192","author":"HJ Nath","year":"2022","unstructured":"Nath HJ, Choudhury H (2022) A privacy-preserving mutual authentication scheme for group communication in VANET. Comput Commun 192:357\u2013372","journal-title":"Comput Commun"},{"key":"8634_CR14","volume":"38","author":"J Qi","year":"2022","unstructured":"Qi J, Gao T, Deng X, Zhao C (2022) A pseudonym-based certificateless privacy-preserving authentication scheme for VANETs. Veh Commun 38:100535","journal-title":"Veh Commun"},{"key":"8634_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108016","volume":"100","author":"GS Rawat","year":"2022","unstructured":"Rawat GS, Singh K, Arshad NI, Hadidi K, Ahmadian A (2022) A lightweight authentication scheme with privacy preservation for vehicular networks. Comput Electr Eng 100:108016","journal-title":"Comput Electr Eng"},{"key":"8634_CR16","doi-asserted-by":"crossref","unstructured":"Shamshad S, Saleem MA, Obaidat MS, Shamshad U, Mahmood K, Ayub MF (2021) On the security of a lightweight privacy-preserving authentication protocol for VANETs. In: 2021 International conference on artificial intelligence and smart systems (ICAIS). IEEE, pp 1766\u20131770","DOI":"10.1109\/ICAIS50930.2021.9395888"},{"key":"8634_CR17","doi-asserted-by":"crossref","unstructured":"Tamilvizhi T, Surendran R, Romero CAT, Sendil MS (2022) Privacy preserving reliable data transmission in cluster based vehicular adhoc networks.\u00a0Intell Autom Soft Comput 34(2)","DOI":"10.32604\/iasc.2022.026331"},{"issue":"11","key":"8634_CR18","doi-asserted-by":"publisher","first-page":"12158","DOI":"10.1109\/TVT.2021.3118892","volume":"70","author":"M Umar","year":"2021","unstructured":"Umar M, Islam SH, Mahmood K, Ahmed S, Ghaffar Z, Saleem MA (2021) Provable secure identity-based anonymous and privacy-preserving inter-vehicular authentication protocol for VANETS using PUF. IEEE Trans Veh Technol 70(11):12158\u201312167","journal-title":"IEEE Trans Veh Technol"},{"issue":"10","key":"8634_CR19","doi-asserted-by":"publisher","first-page":"10436","DOI":"10.1109\/TVT.2021.3107524","volume":"70","author":"Y Wang","year":"2021","unstructured":"Wang Y, Zhang W, Wang X, Khan MK, Fan P (2021) Efficient privacy-preserving authentication scheme with fine-grained error location for cloud-based vanet. IEEE Trans Veh Technol 70(10):10436\u201310449","journal-title":"IEEE Trans Veh Technol"},{"key":"8634_CR20","doi-asserted-by":"publisher","first-page":"62785","DOI":"10.1109\/ACCESS.2019.2915794","volume":"7","author":"Z Wei","year":"2019","unstructured":"Wei Z, Li J, Wang X, Gao CZ (2019) A lightweight privacy-preserving protocol for vanets based on secure outsourcing computing. IEEE Access 7:62785\u201362793","journal-title":"IEEE Access"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08634-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-08634-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08634-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T08:11:54Z","timestamp":1734941514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-08634-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,4]]},"references-count":20,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["8634"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-08634-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2605881\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,4]]},"assertion":[{"value":"23 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with animals performed by any of\u00a0the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}