{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T13:44:10Z","timestamp":1771854250529,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T00:00:00Z","timestamp":1395705600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s00607-014-0393-x","type":"journal-article","created":{"date-parts":[[2014,3,24]],"date-time":"2014-03-24T04:53:09Z","timestamp":1395636789000},"page":"685-708","source":"Crossref","is-referenced-by-count":64,"title":["LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication"],"prefix":"10.1007","volume":"98","author":[{"given":"Mingzhong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,25]]},"reference":[{"key":"393_CR1","unstructured":"Weiland RJ, Purser LB (2000) Intelligent transportation systems. Transportation in the new millennium. http:\/\/trid.trb.org\/view.aspx?id=639268"},{"key":"393_CR2","doi-asserted-by":"crossref","unstructured":"Taylor MAP (2001) Intelligent transport systems. Handbook of transport systems and traffic control. p 461. http:\/\/scholar.google.com\/scholar?q=Handbook+of+transport+systems+and+traffic+control+TAYLOR&btnG=&hl=en&as_sdt=0%2C5","DOI":"10.1108\/9781615832460-031"},{"issue":"4","key":"393_CR3","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MPRV.2006.84","volume":"5","author":"F Wang","year":"2006","unstructured":"Wang F, Zeng D, Yang L (2006) Smart cars on smart roads: an IEEE intelligent transportation systems society update. IEEE Pervasive Comput 5(4):68\u201369","journal-title":"IEEE Pervasive Comput"},{"key":"393_CR4","unstructured":"Dedicated Short Range Communications (DSRC) Home. http:\/\/trid.trb.org\/view.aspx?id=725762 . Accessed 31 Dec 2002"},{"key":"393_CR5","unstructured":"Msn, TV. http:\/\/www.msntv.com\/ . Accessed 20 May 2007"},{"key":"393_CR6","doi-asserted-by":"crossref","unstructured":"Raya M, Hubaux J (2005) The security of vehicular ad Hoc networks. In: Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks, pp 11\u201321","DOI":"10.1145\/1102219.1102223"},{"issue":"1","key":"393_CR7","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","volume":"13","author":"M Raya","year":"2006","unstructured":"Raya M, Papadimitratos P, Hubaux JP (2006) Securing vehicular communications. IEEE Wirel Commun 13(1):8\u201315","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"393_CR8","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun Y, Lu R, Lin X, Shen XS (2010) An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans Veh Technol 59(1):3589\u20133603","journal-title":"IEEE Trans Veh Technol"},{"key":"393_CR9","volume-title":"Modern cryptography: theory and practice","author":"W Mao","year":"2003","unstructured":"Mao W (2003) Modern cryptography: theory and practice. Prentice-Hall, Englewood Cliffs"},{"key":"393_CR10","doi-asserted-by":"crossref","unstructured":"Libert B, Vergnaud D (2008) Multi-use unidirectional proxy re-signatures. In: Proceedings of ACM CCS, Alexandria, pp 511\u2013520","DOI":"10.1145\/1455770.1455835"},{"key":"393_CR11","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Zhu H, Ho P, Shen XS (2008) ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of 2008 INFOCOM, pp 1229\u20131237","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"393_CR12","doi-asserted-by":"crossref","unstructured":"Zhang C, Lu R, Lin X, Ho P, Shen XS (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceedings of 2008 INFOCOM, pp 246\u2013250","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"393_CR13","doi-asserted-by":"crossref","unstructured":"Fiat A (1990) Batch RSA. In: Proceedings of CRYPTO\u201989, pp 175\u2013185","DOI":"10.1007\/0-387-34805-0_17"},{"key":"393_CR14","doi-asserted-by":"crossref","unstructured":"Camenisch J, Hohenberger S, Pedersen M (2007) Batch verification of short signatures. In: Proceedings of EUROCRYPT\u201907, pp 246\u2013263","DOI":"10.1007\/978-3-540-72540-4_14"},{"issue":"1","key":"393_CR15","first-page":"3442","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin X, Sun X, Ho P, Shen XS (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(1):3442\u20133456","journal-title":"IEEE Trans Veh Technol"},{"key":"393_CR16","doi-asserted-by":"crossref","unstructured":"Cham D, Heyst EV (1991) Group signatures. In: Proceedings of 1991 advances in cryptology- EUROCRYPT, pp 257\u2013265","DOI":"10.1007\/3-540-46416-6_22"},{"key":"393_CR17","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Proceedings of 2004 CRYPTO, pp 227\u2013242","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"393_CR18","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proceedings of 1984 advances in CryptologyCrypto. Springer, New York, pp 47\u201353"},{"key":"393_CR19","doi-asserted-by":"crossref","unstructured":"Wang F, Xu YJ, Wu L, Dan Liu, Zhu LH (2013) Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor. In: Proceedings of the 11th annual international conference on mobile systems, applications, and services (MobiSys \u201913). ACM, New York, pp 519\u2013520","DOI":"10.1145\/2462456.2465712"},{"issue":"1","key":"393_CR20","doi-asserted-by":"crossref","first-page":"1606","DOI":"10.1109\/TVT.2009.2038222","volume":"59","author":"L Zhang","year":"2010","unstructured":"Zhang L, Wu Q, Solanas A, Domingo FJ (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 59(1):1606\u20131617","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"393_CR21","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","volume":"25","author":"K Sampigethaya","year":"2007","unstructured":"Sampigethaya K, Li M, Huang L, Poovendran R (2007) AMOEBA: robust location privacy scheme for VANET. IEEE J Sel Areas Commun 25(1):1569\u20131589","journal-title":"IEEE J Sel Areas Commun"},{"key":"393_CR22","doi-asserted-by":"crossref","unstructured":"Calandriello G, Papadimitratos P, Hubaux J, Lioy A (2007) Efficient and robust pseudonymous authentication in VANET. In: Proceedings of 2007 the fourth ACM international workshop on Vehicular, ad hoc networks, pp 19\u201328","DOI":"10.1145\/1287748.1287752"},{"issue":"6","key":"393_CR23","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/JCN.2009.6388411","volume":"11","author":"A Studer","year":"2008","unstructured":"Studer A, Bai F, Bellur B, Perrig A (2008) Flexible, extensible, and efficient VANET authentication. J Commun Netw 11(6):574\u2013588","journal-title":"J Commun Netw"},{"key":"393_CR24","unstructured":"Perrig A, Canetti R, Tygar JD, Song D (2002) The TESLA broadcast authentication protocol. In: Proceedings of RSA CryptoBytes\u201902"},{"issue":"1","key":"393_CR25","doi-asserted-by":"crossref","first-page":"4987","DOI":"10.1109\/T-WC.2008.070773","volume":"7","author":"X Lin","year":"2008","unstructured":"Lin X, Sun X, Wang X, Zhang C, Ho P, Shen XS (2008) TSVC\u2014timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wirel Commun 7(1):4987\u20134998","journal-title":"IEEE Trans Wirel Commun"},{"issue":"4","key":"393_CR26","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/TVT.2006.877704","volume":"55","author":"K Ren","year":"2006","unstructured":"Ren K, Lou W, Deng RH, Kim K (2006) A novel privacy preserving authentication and access control scheme in pervasive computing environments. IEEE Trans Veh Technol 55(4):1373\u20131384","journal-title":"IEEE Trans Veh Technol"},{"key":"393_CR27","unstructured":"Sampigethava K, Huang L, Li M, Poovendran R, Matsuura K, Sezaki K (2006) CARAVAN: providing location privacy for VANET. In: Proceedings of International workshop on vehicular ad hoc networks"},{"key":"393_CR28","unstructured":"Daemen J, Rijmen V (1998) AES Proposal: Rijndael. In: Proceedings of the first advanced encryption standard candidate conference, National Institute of Standards and Technology (NIST)"},{"issue":"1","key":"393_CR29","first-page":"12","volume":"2","author":"M Bellare","year":"1996","unstructured":"Bellare M, Canetti R, Krawczyk H (1996) Message authentication using hash functions the HMAC construction. RSA Lab CryptoBytes 2(1):12\u201315","journal-title":"RSA Lab CryptoBytes"},{"key":"393_CR30","doi-asserted-by":"crossref","unstructured":"Hess F (2003) Efficient identity based signature schemes based on pairings. Sel Areas Cryptogr 2595:310\u2013324","DOI":"10.1007\/3-540-36492-7_20"},{"key":"393_CR31","doi-asserted-by":"crossref","unstructured":"Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. In: Proceedings of 2001 ASIACRYPT, pp 514\u2013532","DOI":"10.1007\/3-540-45682-1_30"},{"key":"393_CR32","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","volume-title":"Introduction to modern cryptography: principles and protocols","author":"J Katz","year":"2007","unstructured":"Katz J, Lindell Y (2007) Introduction to modern cryptography: principles and protocols. Chapman & Hall\/CRC, Boca Raton, Florida"},{"key":"393_CR33","unstructured":"Scott M (2007) Efficient implementation of cryptographic pairings. http:\/\/www.pairing-conference.org\/2007\/invited\/Scott_slide.pdf"},{"issue":"1","key":"393_CR34","doi-asserted-by":"crossref","first-page":"3357","DOI":"10.1109\/TVT.2008.928581","volume":"57","author":"C Zhang","year":"2008","unstructured":"Zhang C, Lin X, Lu R, Ho P, Shen XS (2008) An efficient message authentication scheme for vehicular communications. IEEE Trans Veh Technol 57(1):3357\u20133368","journal-title":"IEEE Trans Veh Technol"},{"key":"393_CR35","doi-asserted-by":"crossref","unstructured":"Keranen A, Ott J, Karkkainen T (2009) The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd international conference on simulation tools and techniques","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"issue":"1","key":"393_CR36","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MCOM.2008.4689252","volume":"46","author":"P Papadimitratos","year":"2008","unstructured":"Papadimitratos P, Levente B, Schoch E, Freudiger J, Raya M, Ma Z (2008) Secure vehicular communication systems: design and architecture. Commun Mag IEEE 46(1):100\u2013109","journal-title":"Commun Mag IEEE"},{"key":"393_CR37","doi-asserted-by":"crossref","unstructured":"Hsiao H, Studer A, Chen C, Perrig A, Bai F, Bellur B (2011) Flooding-resilient broadcast authentication for VANETs. In: Proceedings of the 17th annual international conference on mobile computing and networking, pp 193\u2013204","DOI":"10.1145\/2030613.2030635"},{"issue":"6","key":"393_CR38","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1109\/TPDS.2012.238","volume":"24","author":"X Zhang","year":"2013","unstructured":"Zhang X, Liu C, Nepal S, Pandey S, Chen J (2013) A privacy leakage upper-bound constraint based approach for cost-effective privacy preserving of intermediate datasets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192\u20131202","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"393_CR39","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TPDS.2013.48","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang X, Yang LT, Liu C, Chen J (2014) A scalable two-phase top-down specialization approach for data anonymization using MapReduce on cloud. IEEE Trans Parallel Distrib Syst 25(2):363\u2013373","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"5","key":"393_CR40","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.jcss.2012.11.008","volume":"79","author":"X Zhang","year":"2013","unstructured":"Zhang X, Liu C, Nepal S, Chen J (2013) An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J Comput Syst Sci 79(5):542\u2013555","journal-title":"J Comput Syst Sci"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-014-0393-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-014-0393-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-014-0393-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T20:50:56Z","timestamp":1565297456000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-014-0393-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,25]]},"references-count":40,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["393"],"URL":"https:\/\/doi.org\/10.1007\/s00607-014-0393-x","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,25]]}}}