{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:27:17Z","timestamp":1758893237517},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T00:00:00Z","timestamp":1499817600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s00779-017-1049-6","type":"journal-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T22:55:43Z","timestamp":1499813743000},"page":"903-910","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure group information exchange scheme for vehicular ad hoc networks"],"prefix":"10.1007","volume":"21","author":[{"given":"Lu","family":"Zhou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qiao","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,7,12]]},"reference":[{"key":"1049_CR1","doi-asserted-by":"crossref","unstructured":"Biswas S, Misic J, Misic VB (2012) Ddos attack on wave-enabled vanet through synchronization. In: Global communications conference (GLOBECOM), 2012 IEEE. IEEE, pp 1079\u20131084","DOI":"10.1109\/GLOCOM.2012.6503256"},{"key":"1049_CR2","unstructured":"Safi SM, Movaghar A, Mohammadizadeh M (2009) A novel approach for avoiding wormhole attacks in vanet. In: 1st Asian Himalayas international conference on internet, 2009. AH-ICI 2009. IEEE, pp 1\u20136"},{"key":"1049_CR3","doi-asserted-by":"crossref","unstructured":"Hamieh A, Ben-Othman J, Gueroui A, Na\u00eft-Abdesselam F (2009) Detecting greedy behaviors by linear regression in wireless ad hoc networks. In: IEEE international conference on communications, 2009. ICC\u201909. IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2009.5198908"},{"issue":"4","key":"1049_CR4","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1002\/sec.679","volume":"6","author":"S Park","year":"2013","unstructured":"Park S, Aslam B, Turgut D, Zou CC (2013) Defense against sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur Commun Netw 6(4):523\u2013538","journal-title":"Secur Commun Netw"},{"issue":"4","key":"1049_CR5","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally S, Hunt R, Chen Y-S, Irwin A, Hassan A (2012) Vehicular ad hoc networks (vanets): status, results, and challenges. Telecommun Syst 50(4):217\u2013241","journal-title":"Telecommun Syst"},{"key":"1049_CR6","doi-asserted-by":"crossref","unstructured":"Zhu L, Chen C, Wang X, Lim AO (2011) Smss: Symmetric-masquerade security scheme for vanets. In: 10th international symposium on autonomous decentralized systems (ISADS), 2011. IEEE, pp 617\u2013622","DOI":"10.1109\/ISADS.2011.88"},{"key":"1049_CR7","doi-asserted-by":"crossref","unstructured":"Tyagi P, Dembla D (2014) Investigating the security threats in vehicular ad hoc networks (vanets) Towards security engineering for safer on-road transportation. In: 2014 international conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 2084\u20132090","DOI":"10.1109\/ICACCI.2014.6968313"},{"key":"1049_CR8","doi-asserted-by":"crossref","unstructured":"Ren D, Suguo D, Zhu H (2011) A novel attack tree based risk assessment approach for location privacy preservation in the vanets. In: 2011 IEEE international conference on communications (ICC). IEEE, pp 1\u20135","DOI":"10.1109\/icc.2011.5962947"},{"issue":"6","key":"1049_CR9","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin X, Sun X, Ho P-H, Shen X (2007) Gsis: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442\u20133456","journal-title":"IEEE Trans Veh Technol"},{"issue":"7","key":"1049_CR10","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1109\/TIFS.2015.2491261","volume":"11","author":"Zhe Liu","year":"2016","unstructured":"Liu Zhe, Seo Hwajeong, Gro\u00dfsch\u00e4l J, Kim H (2016) Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit avr-based sensor nodes. IEEE Trans Inf Forensics Secur 11(7):1385\u20131397","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1049_CR11","unstructured":"Seo H, Liu Z, Park T, Kim H, Lee Y, Choi J, Kim H (2013) Parallel implementations of LEA. In: Lee H-S, Han D-G (eds) The 16th international conference on information security and cryptology \u2014 ICISC 2013, volume 8565 of lecture notes in computer science. Springer Verlag, pp 256\u2013274"},{"issue":"6","key":"1049_CR12","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929\u2013936","journal-title":"J Internet Technol"},{"issue":"8","key":"1049_CR13","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 7(8):1283\u20131291","journal-title":"Secur Commun Netw"},{"key":"1049_CR14","doi-asserted-by":"crossref","unstructured":"Liu Z, Huang X, Hu Z, Khurram Khan M, Seo H, Zhou L (2016) On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans Dependable Secure Comput","DOI":"10.1109\/TDSC.2016.2577022"},{"key":"1049_CR15","volume-title":"Elements of information theory","author":"TM Cover","year":"2012","unstructured":"Cover TM, Thomas JA (2012) Elements of information theory. Wiley, New York"},{"key":"1049_CR16","doi-asserted-by":"crossref","unstructured":"Liu Q, Gong G, Wang Y, Li H (2015) A novel physical layer security scheme for MIMO two-way relay channels. In: 2015 IEEE globecom workshops. San Diego, CA, USA, December 6-10, 2015, pp 1\u20136","DOI":"10.1109\/GLOCOMW.2015.7414118"},{"key":"1049_CR17","doi-asserted-by":"crossref","unstructured":"Liu Q, Gong G (2016) Physical layer secure information exchange protocol for mimo ad hoc networks against passive attacks. In: 2016 IEEE global communications conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOCOM.2016.7842142"},{"issue":"3","key":"1049_CR18","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1109\/TCOMM.2012.010213.120265","volume":"61","author":"T Yang","year":"2013","unstructured":"Yang T, Yuan X, Li P, Collings IB, Yuan J (2013) A new physical-layer network coding scheme with eigen-direction alignment precoding for mimo two-way relaying. IEEE Trans Commun 61(3):973\u2013986","journal-title":"IEEE Trans Commun"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-017-1049-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1049-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1049-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T12:28:03Z","timestamp":1569760083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-017-1049-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,12]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1049"],"URL":"https:\/\/doi.org\/10.1007\/s00779-017-1049-6","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,12]]}}}