{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:41:12Z","timestamp":1778344872526,"version":"3.51.4"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T00:00:00Z","timestamp":1498608000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10586-017-0987-0","type":"journal-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T04:46:11Z","timestamp":1498625171000},"page":"3489-3497","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Securing video cloud storage by ERBAC mechanisms in 5g enabled vehicular networks"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7832-5820","authenticated-orcid":false,"given":"R.","family":"Gopi","sequence":"first","affiliation":[]},{"given":"A.","family":"Rajesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,28]]},"reference":[{"issue":"2","key":"987_CR1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MNET.2015.7064895","volume":"29","author":"X Shen","year":"2015","unstructured":"Shen, X.: Device-to-device communication in 5G cellular networks. IEEE Netw. 29(2), 2\u20133 (2015)","journal-title":"IEEE Netw."},{"issue":"12","key":"987_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TVT.2015.2503645","volume":"64","author":"M Eiza","year":"2015","unstructured":"Eiza, M., Owens, T., Ni, Q., Shi, Q.: Situation-aware QoS routing algorithm for vehicular ad hoc networks. IEEE Trans. Veh. Technol. 64(12), 1\u201316 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"7","key":"987_CR3","first-page":"2991","volume":"64","author":"E Belyaev","year":"2014","unstructured":"Belyaev, E., Vinel, A., Surak, A., Gabbouj, M., Jonsson, M., Egiazarian, K.: Robust vehicle-to-infrastructure video transmission for road surveillance applications. IEEE Trans. Veh. Technol. 64(7), 2991\u20133003 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"987_CR4","doi-asserted-by":"crossref","unstructured":"Horn, G., Schneider, P.: Towards 5G security. In: Proceedings of IEEE TrustCom15, Helsinki, Finland (2015)","DOI":"10.1109\/Trustcom.2015.499"},{"issue":"4","key":"987_CR5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Di Renzo, M.: Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20\u201327 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"9","key":"987_CR6","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","volume":"21","author":"J Sun","year":"2010","unstructured":"Sun, J., Zhang, C., Zhang, Y., Fang, Y.: An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans. Parallel Distrib. Sys. 21(9), 1227\u20131239 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Sys."},{"issue":"1","key":"987_CR7","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.csi.2013.06.001","volume":"36","author":"CT Barba","year":"2013","unstructured":"Barba, C.T., Aguiar, L.U., Igartua, M.A., Parra-Arnau, J., Rebollo-Monedero, D., Forn\u00e9, J., Pallar\u00e8s, E.: A collaborative protocol for anonymous reporting in vehicular ad hoc networks. Comput. Stand. Interfaces 36(1), 188\u2013197 (2013)","journal-title":"Comput. Stand. Interfaces"},{"issue":"1","key":"987_CR8","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"MK Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for Web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66\u201392 (1998)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"987_CR9","unstructured":"Hu, W., Xue, K., Hong, P., Wu, C.: ATCS: a novel anonymous and traceable communication scheme for vehicular ad hoc networks. Int. J. Netw. Secur. 13(2), 71\u201378 (2011)"},{"issue":"4","key":"987_CR10","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TVT.2008.2002581","volume":"58","author":"V Daza","year":"2009","unstructured":"Daza, V., Ferrer, J.D.: Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 58(4), 1876\u20131886 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"987_CR11","doi-asserted-by":"crossref","unstructured":"Kim, B.H., Choi, K.Y., Lee, J.H., Lee, D.H.: Anonymous and traceable communication using tamper-proof device for vehicular Ad Hoc Networks. In: Proceedings of ICCIT, Gyeongju (2007)","DOI":"10.1109\/ICCIT.2007.4420338"},{"issue":"7","key":"987_CR12","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.1109\/TVT.2010.2051468","volume":"59","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Lu, R., Lin, X., Shen, X., Su, J.: An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications. IEEE Trans. Veh. Technol. 59(7), 3589\u20133603 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"987_CR13","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P.-H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: Proceedings of INFOCOM, Phoenix (2008)","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"987_CR14","doi-asserted-by":"crossref","unstructured":"Calandriell, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Proceedings of VANET\u201907, Montreal (2007)","DOI":"10.1145\/1287748.1287752"},{"key":"987_CR15","doi-asserted-by":"crossref","unstructured":"Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of Eurocrypt, Switzerland (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"987_CR16","doi-asserted-by":"crossref","unstructured":"Baek, J., Safiavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Proceedings of ICCSA, Perugia, Italy (2008)","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"987_CR17","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Sympos. Security and Privacy, Oakland, CA (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"11","key":"987_CR18","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"1","key":"987_CR19","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MWC.2014.6812298","volume":"21","author":"WH Chin","year":"2014","unstructured":"Chin, W.H., Fan, Z., Haines, R.: Emerging technologies and research challenges for 5G wireless networks. IEEE Wireless Commun. 21(1), 106\u2013112 (2014)","journal-title":"IEEE Wireless Commun."},{"key":"987_CR20","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/ACCESS.2013.2260813","volume":"1","author":"T Rappaport","year":"2013","unstructured":"Rappaport, T., Sun, S., Mayzus, R., Zhao, H., Azar, Y., Wang, K., Wong, G., Schulz, J., Samimi, M., Gutierrez, F.: Millimeter wave mobile communications for 5G cellular: It will work!. IEEE Access 1, 335\u2013349 (2013)","journal-title":"IEEE Access"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0987-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0987-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0987-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T04:48:17Z","timestamp":1569559697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0987-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,28]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["987"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0987-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,28]]}}}