{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:07:11Z","timestamp":1758704831513},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,1,5]],"date-time":"2013-01-05T00:00:00Z","timestamp":1357344000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s10586-012-0242-7","type":"journal-article","created":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T21:14:00Z","timestamp":1357334040000},"page":"413-421","source":"Crossref","is-referenced-by-count":14,"title":["An analytical model for random pseudonym change scheme in VANETs"],"prefix":"10.1007","volume":"17","author":[{"given":"Yuanyuan","family":"Pan","sequence":"first","affiliation":[]},{"given":"Jianqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Li","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,5]]},"reference":[{"issue":"1","key":"242_CR1","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A. Beresford","year":"2003","unstructured":"Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Comput."},{"key":"242_CR2","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-73275-4_10","volume-title":"Proceedings of the 4th European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2007)","author":"L. Butty\u00e1n","year":"2007","unstructured":"Butty\u00e1n, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: Proceedings of the 4th European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2007), Cambridge, UK, pp. 129\u2013141 (2007)"},{"key":"242_CR3","first-page":"1","volume-title":"Proceedings of the 29th IEEE International Conference on Computer Communications (IEEE INFOCOM 2010)","author":"J. Freudiger","year":"2010","unstructured":"Freudiger, J., Manshaei, M., Boudec, J.Y.L., Hubaux, J.P.: On the age of pseudonyms in mobile ad hoc networks. In: Proceedings of the 29th IEEE International Conference on Computer Communications (IEEE INFOCOM 2010), San Diego, California, USA, pp. 1\u20139 (2010)"},{"key":"242_CR4","first-page":"1","volume-title":"Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 2007)","author":"J. Freudiger","year":"2007","unstructured":"Freudiger, J., Raya, M., Feleghhazi, M.: Mix-zones for location privacy in vehicular networks. In: Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 2007), pp. 1\u20137. Vancouver, British, Columbia (2007)"},{"key":"242_CR5","first-page":"2521","volume-title":"Proceedings of IEEE 65th Vehicular Technology Conference (VTC2007)","author":"M. Gerlach","year":"2007","unstructured":"Gerlach, M., Guttler, F.: Privacy in vanets using changing pseudonyms\u2014ideal and real. In: Proceedings of IEEE 65th Vehicular Technology Conference (VTC2007), Dublin, Ireland, pp.\u00a02521\u20132525 (2007)"},{"issue":"6","key":"242_CR6","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","volume":"46","author":"H. Hartenstein","year":"2008","unstructured":"Hartenstein, H., Laberteaux, K.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6), 164\u2013171 (2008)","journal-title":"IEEE Commun. Mag."},{"key":"242_CR7","doi-asserted-by":"crossref","first-page":"1187","DOI":"10.1109\/WCNC.2005.1424677","volume-title":"Proceedings of 2005 IEEE Wireless Communications and Networking Conference (WCNC)","author":"L. Huang","year":"2005","unstructured":"Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: Proceedings of 2005 IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, vol. 2, pp. 1187\u20131192 (2005)"},{"key":"242_CR8","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/1179601.1179605","volume-title":"Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (WPES \u201906)","author":"M. Li","year":"2006","unstructured":"Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (WPES \u201906). Alexandria, Virginia, USA, pp. 19\u201328 (2006)"},{"key":"242_CR9","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1109\/I-SPAN.2009.103","volume-title":"Proceedings of 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN)","author":"J. Liao","year":"2009","unstructured":"Liao, J., Li, J.: Effectively changing pseudonyms for privacy protection in vanets. In: Proceedings of 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN), Kaohsiung, Taiwan, pp. 648\u2013652 (2009)"},{"issue":"1","key":"242_CR10","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R. Lu","year":"2012","unstructured":"Lu, R., Li, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans. Veh. Technol. 61(1), 86\u201396 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"242_CR11","first-page":"1","volume-title":"Proc. SARNOFF \u201909","author":"Z. Ma","year":"2009","unstructured":"Ma, Z., Kargl, F., Weber, M.: A location privacy metric for v2x communication systems. In: Proc. SARNOFF \u201909, Princeton, NJ, pp. 1\u20136 (2009)"},{"issue":"11","key":"242_CR12","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MCOM.2008.4689252","volume":"46","author":"P. Papadimitratos","year":"2008","unstructured":"Papadimitratos, P., et al.: Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46(11), 100\u2013109 (2008)","journal-title":"IEEE Commun. Mag."},{"key":"242_CR13","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1102219.1102223","volume-title":"Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN \u201905)","author":"M. Raya","year":"2005","unstructured":"Raya, M., Hubaux, J.P.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN \u201905), Alexandria, VA, USA, pp. 11\u201321 (2005)"},{"key":"242_CR14","volume-title":"Introduction to Probability Models","author":"S.M. Ross","year":"2007","unstructured":"Ross, S.M.: Introduction to Probability Models, 9th edn. Elsevier\/Academic Press, Amsterdam (2007)","edition":"9"},{"issue":"8","key":"242_CR15","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","volume":"25","author":"K. Sampigethaya","year":"2007","unstructured":"Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: robust location privacy scheme for vanet. IEEE J. Sel. Areas Commun. 25(8), 1569\u20131589 (2007)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"242_CR16","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/11964254_6","volume-title":"Proceedings of the Third European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006)","author":"E. Schoch","year":"2006","unstructured":"Schoch, E., Kargl, F., Leinm\u00fcller, T., Schlott, S., Papadimitratos, P.: Impact of pseudonym changes on geographic routing in vanets. In: Proceedings of the Third European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006), Hamburg, Germany, pp. 43\u201357 (2006)"},{"issue":"1","key":"242_CR17","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/s11036-009-0167-4","volume":"15","author":"J.H. Song","year":"2010","unstructured":"Song, J.H., Wong, V.W.S., Leung, V.C.M.: Wireless location privacy protection in vehicular ad-hoc networks. Mob. Netw. Appl. 15(1), 160\u2013171 (2010)","journal-title":"Mob. Netw. Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-012-0242-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-012-0242-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-012-0242-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T18:40:16Z","timestamp":1559241616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-012-0242-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,5]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["242"],"URL":"https:\/\/doi.org\/10.1007\/s10586-012-0242-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,5]]}}}