{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:24:08Z","timestamp":1773512648811,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2011,9,14]],"date-time":"2011-09-14T00:00:00Z","timestamp":1315958400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s11276-011-0383-2","type":"journal-article","created":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T09:33:19Z","timestamp":1315906399000},"page":"1851-1865","source":"Crossref","is-referenced-by-count":128,"title":["On batch verification with group testing for vehicular communications"],"prefix":"10.1007","volume":"17","author":[{"given":"Chenxi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Pin-Han","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Janos","family":"Tapolcai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,14]]},"reference":[{"key":"383_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lu, R., Lin, X., Ho, P.-H., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. The 27th IEEE international conference on computer communications (INFOCOM 2008), pp. 816\u2013824.","DOI":"10.1109\/INFOCOM.2008.58"},{"issue":"2","key":"383_CR2","first-page":"1","volume":"11","author":"J. A. Misener","year":"2005","unstructured":"Misener, J. A. (2005). Vehicle-infrastructure integration (VII) and satety: rubber and radio meets the road in california. Intellimotion, 11(2), 1\u20133.","journal-title":"Intellimotion"},{"issue":"5","key":"383_CR3","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/WC-M.2006.250358","volume":"13","author":"U. Lee","year":"2006","unstructured":"Lee, U., Magistretti, E., Zhou, B., Gerla, M., Bellavista, P., & Corradi, A. (2006). Mobeyes: smart mobs for urban monitoring with a vehicular sensor network. IEEE Wireless Communications, 13(5), 52\u201357.","journal-title":"IEEE Wireless Communications"},{"issue":"4","key":"383_CR4","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MPRV.2006.84","volume":"5","author":"F. Wang","year":"2006","unstructured":"Wang, F., Zeng, D., & Yang, L. (2006). Smart cars on smart roads: an IEEE intelligent transportation systems society update. IEEE Pervasive Computing, 5(4), 68\u201369.","journal-title":"IEEE Pervasive Computing"},{"key":"383_CR5","unstructured":"Dedicated Short Range Communications (DSRC), [Online]. Available: http:\/\/grouper.ieee.org\/groups\/scc32\/dsrc\/index.html ."},{"issue":"3","key":"383_CR6","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"2","author":"J. P. Hubaux","year":"2004","unstructured":"Hubaux, J. P., Capkun, S., & Luo, J. (2004). The security and privacy of smart vehicles. IEEE Security and Privacy Magazine, 2(3), 49\u201355.","journal-title":"IEEE Security and Privacy Magazine"},{"key":"383_CR7","unstructured":"Raya, M., & Hubaux, J. P. (2005). \u201cSecurity aspects of inter-vehicle communications,\u201d in Proceedings of Swiss Transport Research Conference."},{"issue":"1","key":"383_CR8","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39\u201368.","journal-title":"Journal of Computer Security"},{"issue":"5","key":"383_CR9","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","volume":"13","author":"M. Raya","year":"2006","unstructured":"Raya, M., Papadimitratos, P., & Hubaux, J. P. (2006). Securing vehicular communications. IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, 13(5), 8\u201315.","journal-title":"IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications"},{"key":"383_CR10","doi-asserted-by":"crossref","unstructured":"Raya, M., Aziz, A., & Hubaux, J. P. (2006). Efficient secure aggregation in VANETs. In Proceedings of International workshop on Vehicular ad hoc networks, pp. 67\u201375.","DOI":"10.1145\/1161064.1161076"},{"issue":"6","key":"383_CR11","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X. Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications. IEEE Transaction on Vehicular Technology, 56(6), 3442\u20133456.","journal-title":"IEEE Transaction on Vehicular Technology"},{"key":"383_CR12","doi-asserted-by":"crossref","unstructured":"Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004, October). Vehicle-to-vehicle safety messaging in DSRC. In Proceedings of international workshop on vehicular ad hoc networks, pp. 19\u201328.","DOI":"10.1145\/1023875.1023879"},{"key":"383_CR13","unstructured":"Yang, X., Liu, J., Zhao, F., & Vaidya, N. (Aug. 2004). A vehicle-to-vehicle communication protocol for cooperative collision warning. In Proceedings of IEEE MobiQuitous, pp. 114\u2013123."},{"key":"383_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., & Ho, P.-H. (2008). RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In Proceedings of IEEE international conference on communications, Beijing, China.","DOI":"10.1109\/ICC.2008.281"},{"key":"383_CR15","doi-asserted-by":"crossref","unstructured":"Sha, K., Xi, Y., Shi, W., Schwiebert, L., & Zhang, T. (2006). Adaptive privacy-preserving authentication in vehicular networks. In Proceedings of IEEE international workshop on vehicle communication and applications, pp. 1\u20138.","DOI":"10.1109\/CHINACOM.2006.344746"},{"issue":"4","key":"383_CR16","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.2008.4481346","volume":"46","author":"X. Lin","year":"2008","unstructured":"Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P.-H., & Shen, X. (2008). Security in vehicular ad hoc networks. IEEE Communications Magazine, 46(4), 88\u201395.","journal-title":"IEEE Communications Magazine"},{"key":"383_CR17","unstructured":"U.S. Department of Transportation, National Highway Traffic Safety Adimistrtation, Vehicle Safety Communications Project, Final Repot, (Apr. 2006)."},{"key":"383_CR18","unstructured":"Road Weather Management. [Online]. Available: http:\/\/www.itsove-rview.its.dot.gov\/RWM.asp ."},{"issue":"4","key":"383_CR19","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/TVT.2006.877704","volume":"55","author":"K. Ren","year":"2006","unstructured":"Ren, K., Lou, W., Deng, R. H., & Kim, K. (2006). A novel privacy preserving authentication and access control scheme in pervasive computing environments. IEEE Transactions on Vehicular Technology, 55(4), 1373\u20131384.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"383_CR20","unstructured":"Sampigethava, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., & Sezaki, K. (2006). CARAVAN: Providing location privacy for VANET. In Proceedings of international workshop on Vehicular ad hoc networks."},{"key":"383_CR21","doi-asserted-by":"crossref","unstructured":"Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Proceedings of Crypto, LNCS, Vol. 2139, pp. 213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"5","key":"383_CR22","first-page":"1234","volume":"E84-A","author":"A. Miyaji","year":"2001","unstructured":"Miyaji, A., Nakabayashi, M., & Takano, S. (2001). New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, E84-A(5), 1234\u20131243.","journal-title":"IEICE Transactions on Fundamentals"},{"key":"383_CR23","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the weil pairing. In Proceedings of Asiacrypt, 2248, 514\u2013532.","DOI":"10.1007\/3-540-45682-1_30"},{"key":"383_CR24","unstructured":"Fiat, A. (1989). Batch RSA. In Proceedings of Crypto, pp. 175\u2013185."},{"key":"383_CR25","unstructured":"Naccache, D., M\u2019Ra\u00efhi, D., Vaudenay, S., & Raphaeli, D. (1994). Can D.S.A be improved? Complexity trade-offs with the digital signature standard. In Proceedings of EUROCRYPT, LNCS, 950, pp. 77\u201385."},{"key":"383_CR26","unstructured":"Cha, J. C., & Cheon, J. H. (2003). An identity-based signature from gap Diffie-Hellman groups. In Proceedings of public key cryptography, pp 18\u201330."},{"key":"383_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, F., Safavi-Naini, R., & Susilo, W. (2003). Efficient verifiably encrypted encrypted signature and partially blind signature from bilinear pairings. In Proceedings of indocrypt, LNCS, 2904, pp. 191\u2013204.","DOI":"10.1007\/978-3-540-24582-7_14"},{"key":"383_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, F., & Kim, K. (2003). Efficient ID-based blind signature and proxy signature from bilinear pairings. In Proceedings of ACISP, LNCS, 2727, pp 312\u2013323.","DOI":"10.1007\/3-540-45067-X_27"},{"key":"383_CR29","unstructured":"Yoon, H., Cheon, J. H., & Kim, Y. (2004). Batch verification with ID-based signatures. In Proceedings of information security and cryptology, pp 233\u2013248."},{"key":"383_CR30","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Hohenberger, S., & Pedersen, M. \u00d8. (2007). Batch verification of short signatures. In Proceedings of EUROCRYPT, LNCS, 4514, pp 246\u2013263.","DOI":"10.1007\/978-3-540-72540-4_14"},{"key":"383_CR31","doi-asserted-by":"crossref","unstructured":"Camenisch, J., & Lysyanskaya, A. (2004). Signature schemes and anonymous credentials from bilinear maps. In Proceedings of Crypto, LNCS, 3152, pp 56\u201372.","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"383_CR32","doi-asserted-by":"crossref","unstructured":"Eastlake, D. & Jones, P. (2001). US secure hash algorithm 1 (SHA1). IETF RFC 3174.","DOI":"10.17487\/rfc3174"},{"issue":"4","key":"383_CR33","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"383_CR34","doi-asserted-by":"crossref","unstructured":"Miller, V. S. (1985, August). Use of elliptic curves in crytography. In Proceedings of advance in cryptology, pp. 417\u2013426.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"383_CR35","unstructured":"IEEE Standard 1609.2. (2006). IEEE trial-use standard for wireless access in vehicular environments\u2014security services for applications and management messages."},{"key":"383_CR36","volume-title":"Combinatorial group testing and its applications, 2nd Edn","author":"D. Du","year":"2000","unstructured":"Du, D., & Hwang, F. K. (2000). Combinatorial group testing and its applications (2nd Edn.). World Scientific, Singapore."},{"issue":"1","key":"383_CR37","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/TR.2004.823851","volume":"53","author":"N. Ye","year":"2004","unstructured":"Ye, N. (2004). Robustness of the Markov-chain model for cyber-attack detection. IEEE Transactions on Reliability, 53(1), 116\u2013123.","journal-title":"IEEE Transactions on Reliability"},{"key":"383_CR38","unstructured":"Ye, N. (2000). A Markov chain model of temporal behavior for anomaly detection. In Proceedings of the IEEE systems, man, and cybernetics information assurance workshops."},{"key":"383_CR39","unstructured":"Markov, A. A. (1971). Extension of the limit theorems of probability theory to a sum of variables connected in a chain. Reprinted in Appendix B of: R. Howard. Dynamic probabilistic systems, Vol. 1, Markov Chains. New York: Wiley."},{"key":"383_CR40","unstructured":"Zaverucha, G. M., & Stinson, D. R. (2009). Group testing and batch verification. The 4th international conference on information theoretic security, ICITS 2009."},{"issue":"5","key":"383_CR41","first-page":"1234","volume":"E84-A","author":"A. Miyaji","year":"2001","unstructured":"Miyaji, A., Nakabayashi, M., & Takano, S. (2001). New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, E84-A(5), 1234\u20131243.","journal-title":"IEICE Transactions on Fundamentals"},{"key":"383_CR42","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., & Shacham, H. (2003). Aggregate and verifiably encrypted signatures from bilinear maps,\u201d In Procedings of Eurocrypt, LNCS, 2656, pp 416\u2013432.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"383_CR43","unstructured":"Scott, M. Efficient implementation of crytographic pairings, [Online]. Available: http:\/\/ecrypt-ss07.rhul.ac.uk\/Slides\/Thursday\/mscott-samos07.pdf ."},{"key":"383_CR44","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., & Shacham, H. (2004). Short group signatures. In Advances in cryptology, LNCS, 3152, pp 41\u201355.","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"383_CR45","doi-asserted-by":"crossref","unstructured":"Lee, S.-B., Pan, G., Park, J.-S., Gerla, M., Lu, S. (2007). Secure incentives for commercial ad dissemination in vehicular networks. In Proceedings of MobiHoc.","DOI":"10.1145\/1288107.1288128"},{"issue":"6","key":"383_CR46","doi-asserted-by":"crossref","first-page":"3357","DOI":"10.1109\/TVT.2008.928581","volume":"57","author":"C. Zhang","year":"2008","unstructured":"Zhang, C., Lin, X., Lu, R., Ho, P.-H., & Shen, X. (2008). An efficient message authentication scheme for vehicular communications. IEEE Transactions on Vehicular Technology, 57(6), 3357\u20133368.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"383_CR47","doi-asserted-by":"crossref","first-page":"2472","DOI":"10.1109\/TVT.2010.2044592","volume":"59","author":"S. He","year":"2010","unstructured":"He, S., Chen, J., Sun, Y., Yau, D. K. Y., & Yip, N. K. (2010). On optimal information capture by energy-constrained mobile sensors. IEEE Transactions on Vehicular Technology, 59, 2472\u20132484.","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-011-0383-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-011-0383-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-011-0383-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T12:18:09Z","timestamp":1560601089000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-011-0383-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,14]]},"references-count":47,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["383"],"URL":"https:\/\/doi.org\/10.1007\/s11276-011-0383-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9,14]]}}}