{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:15:11Z","timestamp":1761808511716,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T00:00:00Z","timestamp":1659744000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T00:00:00Z","timestamp":1659744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100014440","name":"ministerio de ciencia, innovaci\u00f3n y universidades","doi-asserted-by":"publisher","award":["MTM2017-83271-R"],"award-info":[{"award-number":["MTM2017-83271-R"]}],"id":[{"id":"10.13039\/100014440","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10207-022-00604-8","type":"journal-article","created":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T13:02:52Z","timestamp":1659790972000},"page":"1151-1162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An anonymous and unlinkable electronic toll collection system"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5341-4299","authenticated-orcid":false,"given":"Ricard","family":"Borges","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7217-5227","authenticated-orcid":false,"given":"Francesc","family":"Seb\u00e9","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1992-146X","authenticated-orcid":false,"given":"Magda","family":"Valls","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,6]]},"reference":[{"key":"604_CR1","doi-asserted-by":"publisher","DOI":"10.1145\/3423165","author":"H Jiang","year":"2022","unstructured":"Jiang, H., Li, J., Zhao, P., Zeng, F., Xiao, Z., Iyengar, A.: Location privacy-preserving mechanisms in location-based services: a comprehensive survey. ACM Comput. Surv. (2022). https:\/\/doi.org\/10.1145\/3423165","journal-title":"ACM Comput. Surv."},{"key":"604_CR2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3290553","author":"MB Mansour","year":"2018","unstructured":"Mansour, M.B., Salama, C., Mohamed, H.K., Hammad, S.A.: VANET security and privacy\u2014an overview. Int. J. Netw. Secur. Appl. (2018). https:\/\/doi.org\/10.2139\/ssrn.3290553","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"604_CR3","doi-asserted-by":"publisher","unstructured":"Amiri, W.A., Baza, M., Banawan, K., Mahmoud, M., Alasmary, W., Akkaya, K.: Privacy-preserving smart parking system using blockchain and private information retrieval. In: 2019 Intl. Conf. on Smart Applications, Communications and Networking, pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/SmartNets48225.2019.9069783","DOI":"10.1109\/SmartNets48225.2019.9069783"},{"key":"604_CR4","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s10207-020-00527-2","volume":"20","author":"R Borges","year":"2021","unstructured":"Borges, R., Seb\u00e9, F.: An efficient privacy-preserving pay-by-phone system for regulated parking areas. Int. J. Inf. Secur. 20, 715\u2013727 (2021). https:\/\/doi.org\/10.1007\/s10207-020-00527-2","journal-title":"Int. J. Inf. Secur."},{"key":"604_CR5","unstructured":"General Data Protection Regulation (GDPR)\u2014Official Legal Text. https:\/\/gdpr-info.eu\/ (2022). Accessed 2 June 2022"},{"key":"604_CR6","unstructured":"Via-T. Sistema de telepeaje. https:\/\/www.viat.es\/ (2022). Accessed 2 June 2022"},{"issue":"1","key":"604_CR7","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.retrec.2012.03.008","volume":"36","author":"H Iseki","year":"2012","unstructured":"Iseki, H., Demisch, A.: Examining the linkages between electronic roadway tolling technologies and road pricing policy objectives. Res. Transp. Econ. 36(1), 121\u2013132 (2012). https:\/\/doi.org\/10.1016\/j.retrec.2012.03.008","journal-title":"Res. Transp. Econ."},{"issue":"1","key":"604_CR8","first-page":"82","volume":"3","author":"A Soni","year":"2016","unstructured":"Soni, A., Kaur, S.: Automated car number plate detection system to detect far number plates. Int. J. Sci. Technol. Eng. 3(1), 82\u201389 (2016)","journal-title":"Int. J. Sci. Technol. Eng."},{"key":"604_CR9","unstructured":"Anowar, M.T., Khan, M.N.H., Kabir, M.A., Hossen, M.D., Alam, M.M., Sunny, M.R., Hasan, M.M.: Application of dedicated short-range communication within M-commerce and intelligent transportation services, and its global adaptation using RFID technology. Imp. J. Interdiscip. Res. 2(7) (2016)"},{"key":"604_CR10","unstructured":"Popoola, S.I., Popoola, O.A., Oluwaranti, A.I., Badejo, J.A., Atayero, A.A.: A Framework for electronic toll collection in smart and connected communities. In: Proc. of the World Congress on Engineering and Computer Science (2017)"},{"key":"604_CR11","doi-asserted-by":"publisher","unstructured":"Chattoraj, S., Bhowmik, S., Vishwakarma, K., Roy, P.: Design and implementation of low cost electronic toll collection system in India. In: Second Intl. Conf. on Electrical, Computer and Communication Technologies (ICECCT), pp. 1\u20134 (2017). https:\/\/doi.org\/10.1109\/ICECCT.2017.8117934","DOI":"10.1109\/ICECCT.2017.8117934"},{"key":"604_CR12","doi-asserted-by":"publisher","unstructured":"Tan, J.Y., Ker, P.J., Mani, D., Arumugam, P.: GPS-based highway toll collection system: novel design and operation. Cogent Eng. 4(1) (2017). https:\/\/doi.org\/10.1080\/23311916.2017.1326199","DOI":"10.1080\/23311916.2017.1326199"},{"key":"604_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5120\/cae2020652860","volume":"7","author":"B Alese","year":"2020","unstructured":"Alese, B., Thompson, A., Ayeni, O., Folasade, A.: A secure alternative for electronic toll collection using barcodes. Commun. Appl. Electron. 7, 19\u201324 (2020). https:\/\/doi.org\/10.5120\/cae2020652860","journal-title":"Commun. Appl. Electron."},{"issue":"2","key":"604_CR14","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0968-090X(00)00041-3","volume":"9","author":"WO Ken","year":"2001","unstructured":"Ken, W.O.: Privacy issues in electronic toll collection. Transp. Res. Part C Emerg. Technol. 9(2), 123\u2013134 (2001). https:\/\/doi.org\/10.1016\/S0968-090X(00)00041-3","journal-title":"Transp. Res. Part C Emerg. Technol."},{"issue":"6","key":"604_CR15","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.clsr.2008.09.006","volume":"24","author":"P Riley","year":"2008","unstructured":"Riley, P.: The tolls of privacy: an underestimated roadblock for electronic toll collection usage. Comput. Law Secur. Rev. 24(6), 521\u2013528 (2008). https:\/\/doi.org\/10.1016\/j.clsr.2008.09.006","journal-title":"Comput. Law Secur. Rev."},{"key":"604_CR16","unstructured":"Balasch, J., Rial, A., Troncoso, C., Preneel, B., Verbauwhede, I.M.R., Geuens, C.: PrETP: privacy-preserving electronic toll pricing. In: 19th USENIX Security Symposium, pp. 63\u201378 (2010)"},{"key":"604_CR17","unstructured":"Meiklejohn, S., Mowery, K., Checkoway, S., Shacham, H.: The phantom tollbooth: privacy-preserving electronic toll collection in the presence of driver collusion. In: 20th USENIX Security Symposium (2011)"},{"issue":"10","key":"604_CR18","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.1093\/comjnl\/bxs033","volume":"56","author":"A Isern-Dey\u00e1","year":"2013","unstructured":"Isern-Dey\u00e1, A., Vives-Guasch, A., Mut-Puigserver, M., Payeras-Capell\u00e1, M.: A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users. Comput. J. 56(10), 1198\u20131215 (2013). https:\/\/doi.org\/10.1093\/comjnl\/bxs033","journal-title":"Comput. J."},{"key":"604_CR19","doi-asserted-by":"publisher","unstructured":"Barki, A., Brunet, S., Desmoulins, N., Gambs, S., Gharout, S., Traor\u00e9, J.: Private eCash in practice (short paper). In: Financial Cryptography and Data Security (FC 2016). Lecture Notes in Computer Science, vol. 9603. Springer, Berlin (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_6","DOI":"10.1007\/978-3-662-54970-4_6"},{"key":"604_CR20","doi-asserted-by":"crossref","unstructured":"Hoffmann, M., Fetzer, V., Nagel, M., Rupp, A., Schwerdt, R.: P4TC\u2014provably-secure yet practical privacy-preserving toll collection. Proc. Priv. Enhanc. Technol. (3), 62\u2013152 (2020)","DOI":"10.2478\/popets-2020-0046"},{"key":"604_CR21","doi-asserted-by":"publisher","unstructured":"McEntyre, J., Kihei, B.: Zero-knowledge proof for enabling privacy preserving electronic toll collection with vehicle-to-everything communications. In: IEEE Intl. Conf. on Consumer Electronics (2022). https:\/\/doi.org\/10.1109\/ICCE53296.2022.9730305","DOI":"10.1109\/ICCE53296.2022.9730305"},{"key":"604_CR22","doi-asserted-by":"publisher","unstructured":"Didouh, A., Lopez, A.B., Hillali, Y.E., Rivenq, A., Faruque, M.A.A.: Eve, you shall not get access! A cyber-physical blockchain architecture for electronic toll collection security. In: 2020 IEEE 23rd Intl. Conf. on Intelligent Transportation Systems (ITSC), pp. 1\u20137 (2020). https:\/\/doi.org\/10.1109\/ITSC45102.2020.9294334","DOI":"10.1109\/ITSC45102.2020.9294334"},{"issue":"4","key":"604_CR23","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1109\/JIOT.2021.3056240","volume":"9","author":"H Karim","year":"2022","unstructured":"Karim, H., Rawat, D.B.: TollsOnly please\u2014homomorphic encryption for toll transponder privacy in internet of vehicles. IEEE Internet Things J. 9(4), 2627\u20132636 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3056240","journal-title":"IEEE Internet Things J."},{"key":"604_CR24","doi-asserted-by":"publisher","unstructured":"Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: Proc. of the 25th annual ACM symposium on Theory of Computing (STOC\u201989), pp. 33\u201343. ACM (1989). https:\/\/doi.org\/10.1145\/73007.73011","DOI":"10.1145\/73007.73011"},{"issue":"2","key":"604_CR25","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978). https:\/\/doi.org\/10.1145\/359340.359342","journal-title":"Commun. ACM"},{"key":"604_CR26","doi-asserted-by":"publisher","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, Boston (1983). https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"604_CR27","volume-title":"Elliptic Curve Cryptography","author":"D Hankerson","year":"2006","unstructured":"Hankerson, D., Menezes, A.: Elliptic Curve Cryptography. Springer, Berlin (2006)"},{"issue":"2","key":"604_CR28","first-page":"7","volume":"2","author":"V Gayoso-Mart\u00ednez","year":"2010","unstructured":"Gayoso-Mart\u00ednez, V., Hern\u00e1ndez-Encinas, L., S\u00e1nchez-\u00c1vila, C.: A survey of the elliptic curve integrated encryption scheme. J. Comput. Sci. Eng. 2(2), 7\u201313 (2010)","journal-title":"J. Comput. Sci. Eng."},{"key":"604_CR29","doi-asserted-by":"publisher","unstructured":"Aiello, B., Ishai, Y., Reingold, O.: Priced oblivious transfer: how to sell digital goods. In: Pfitzmann, B. (ed.) Advances in Cryptology, pp. 119\u2013135. Springer, Berlin (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_8","DOI":"10.1007\/3-540-44987-6_8"},{"key":"604_CR30","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Dubovitskaya, M., Neven, G.: Unlinkable priced oblivious transfer with rechargeable wallets. In: Sion, R. (ed.) Financial Cryptography and Data Security, pp. 66\u201381. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-14577-3_8","DOI":"10.1007\/978-3-642-14577-3_8"},{"key":"604_CR31","unstructured":"Federal Office for Information Security. Cryptographic Mechanisms: Recommendations and Key Lengths. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/TechGuidelines\/TG02102\/BSI-TR-02102-1.pdf (2022)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00604-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00604-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00604-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T15:51:40Z","timestamp":1663948300000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00604-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,6]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["604"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00604-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2022,8,6]]},"assertion":[{"value":"6 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}