{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:23:33Z","timestamp":1773771813644,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T00:00:00Z","timestamp":1419292800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s11276-014-0881-0","type":"journal-article","created":{"date-parts":[[2014,12,22]],"date-time":"2014-12-22T13:27:52Z","timestamp":1419254872000},"page":"1733-1743","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":217,"title":["A secure authentication scheme for VANETs with batch verification"],"prefix":"10.1007","volume":"21","author":[{"given":"Majid","family":"Bayat","sequence":"first","affiliation":[]},{"given":"Mostafa","family":"Barmshoory","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Rahimi","sequence":"additional","affiliation":[]},{"given":"Mohammd Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,23]]},"reference":[{"key":"881_CR1","unstructured":"(2005) Vehicle safety communications project: Task 3 final report: Identify intelligent vehicle safety applications enabled by dsrc, camp vehicle safety communications consortium and others."},{"key":"881_CR2","unstructured":"(2008) Car talk-[update]. IEEE Spectrum, 45, 10."},{"key":"881_CR3","unstructured":"(2010) Dedicated short range communications (5.9 ghz dsrc). http:\/\/www.leearmstrong.com\/DSRC\/DSRCHomeset.htm."},{"key":"881_CR4","unstructured":"(2010) Gnu m, the gnu multiple precision arithmetic library, 5.0."},{"key":"881_CR5","doi-asserted-by":"crossref","unstructured":"Leee std 1609.2-2013 (revision of ieee std 1609.2-2006), 2013. doi: 10.1109\/IEEESTD.2013.6509896. , p 1289.","DOI":"10.1109\/IEEESTD.2013.6509896"},{"key":"881_CR6","doi-asserted-by":"crossref","unstructured":"Boneh. D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In: Advances in cryptology CRYPTO 2001 (pp. 213\u2013229). New York: Springer.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"881_CR7","doi-asserted-by":"crossref","unstructured":"Boyen, X., & Waters, B. (2006). Compact group signatures without random oracles. In: Advances in cryptology-EUROCRYPT 2006 (pp. 427\u2013444). New York: Springer.","DOI":"10.1007\/11761679_26"},{"issue":"1","key":"881_CR8","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/02564602.2014.890844","volume":"31","author":"JM Fuentes de","year":"2014","unstructured":"de Fuentes, J. M., Gonz\u00e1lez-Manzano, L., Gonz\u00e1lez-Tablas, A. I., & Blasco, J. (2014). Security models in vehicular ad-hoc networks: A survey. IETE Technical Review, 31(1), 47\u201364.","journal-title":"IETE Technical Review"},{"key":"881_CR9","unstructured":"Freudiger, J., Raya, M., F\u00e9legyh\u00e1zi, M., & Papadimitratos, P., et al. (2007). Mix-zones for location privacy in vehicular networks. In: Proceedings of the first international workshop on wireless networking for intelligent transportation systems (Win-ITS)."},{"key":"881_CR10","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MOVE.2007.4300813","volume":"2007","author":"J Guo","year":"2007","unstructured":"Guo, J., Baugh, J. P., & Wang, S. (2007). A group signature based secure and privacy-preserving vehicular communication framework. Mobile Networking for Vehicular Environments, 2007, 103\u2013108.","journal-title":"Mobile Networking for Vehicular Environments"},{"key":"881_CR11","volume-title":"Guide to elliptic curve cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Vanstone, S., & Menezes, A. J. (2004). Guide to elliptic curve cryptography. New York: Springer."},{"issue":"8","key":"881_CR12","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/LCOMM.2012.061912.120941","volume":"16","author":"D He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270\u20131273.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"881_CR13","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TWC.2011.110811.111240","volume":"11","author":"D He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48\u201353.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"881_CR14","doi-asserted-by":"crossref","unstructured":"Horng, S., Tzeng, S., Pan, Y., Fan, P., Wang, X., Li, T., et al. (2013). b-specs+: Batch verification for secure pseudonymous authentication in vanet.","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"881_CR15","unstructured":"Krajzewicz, D., Hertkorn, G., R\u00f6ssel, C., & Wagner, P. (2002). Sumo (simulation of urban mobility). In: Proceedings of the 4th middle east symposium on simulation and modelling, pp. 183\u2013187."},{"issue":"6","key":"881_CR16","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","volume":"19","author":"CC Lee","year":"2013","unstructured":"Lee, C. C., & Lai, Y. M. (2013). Toward a secure batch verification with group testing for vanet. Wireless Networks, 19(6), 1441\u20131449.","journal-title":"Wireless Networks"},{"issue":"6","key":"881_CR17","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). Gsis: A secure and privacy-preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, 56(6), 3442\u20133456.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"4","key":"881_CR18","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.2008.4481346","volume":"46","author":"X Lin","year":"2008","unstructured":"Lin, X., Lu, R., Zhang, C., Zhu, H., Ho, P. H., & Shen, X. (2008). Security in vehicular ad hoc networks. IEEE Communications Magazine, 46(4), 88\u201395.","journal-title":"IEEE Communications Magazine"},{"key":"881_CR19","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, PH., & Shen, X. (2008). Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In: INFOCOM 2008. The 27th IEEE conference on computer communications. IEEE."},{"issue":"1","key":"881_CR20","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TITS.2011.2164068","volume":"13","author":"R Lu","year":"2012","unstructured":"Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127\u2013139.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"5","key":"881_CR21","first-page":"1234","volume":"84","author":"A Miyaji","year":"2001","unstructured":"Miyaji, A., Nakabayashi, M., & Takano, S. (2001). New explicit conditions of elliptic curve traces for fr-reduction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 84(5), 1234\u20131243.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"1","key":"881_CR22","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(1), 39\u201368.","journal-title":"Journal of Computer Security"},{"key":"881_CR23","unstructured":"Scott, M. (2007). Efficient implementation of cryptographic pairings. In: Online. http:\/\/www.pairing-conference.org\/2007\/invited\/Scottslide.pdf ."},{"key":"881_CR24","unstructured":"Sun, X. (2007). Anonymous, secure and efficient vehicular communications."},{"key":"881_CR25","doi-asserted-by":"crossref","unstructured":"Sun, X., Lin, X., & Ho, PH. (2007). Secure vehicular communications based on group signature and id-based signature scheme. In: ICC\u201907. IEEE international conference on communications, 2007. IEEE, pp. 1539\u20131545.","DOI":"10.1109\/ICC.2007.258"},{"issue":"2","key":"881_CR26","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TVT.2009.2028893","volume":"59","author":"A Wasef","year":"2010","unstructured":"Wasef, A., Jiang, Y., & Shen, X. (2010). Dcs: An efficient distributed-certificate-service scheme for vehicular networks. IEEE Transactions on Vehicular Technology, 59(2), 533\u2013549.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"881_CR27","doi-asserted-by":"crossref","unstructured":"Xiong, H., Beznosov, K., Qin, Z., & Ripeanu, M. (2010). Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In: 2010 IEEE international conference on communications (ICC). IEEE, pp. 1\u20136.","DOI":"10.1109\/ICC.2010.5502673"},{"issue":"3","key":"881_CR28","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1016\/j.compeleceng.2011.11.009","volume":"38","author":"H Xiong","year":"2012","unstructured":"Xiong, H., Chen, Z., & Li, F. (2012). Efficient and multi-level privacy-preserving communication protocol for vanet. Computers & Electrical Engineering, 38(3), 573\u2013581.","journal-title":"Computers & Electrical Engineering"},{"key":"881_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., & Ho, PH. (2008). Raise: An efficient rsu-aided message authentication scheme in vehicular communication networks. In: ICC\u201908. IEEE international conference on communications, 2008. IEEE, pp. 1451\u20131457.","DOI":"10.1109\/ICC.2008.281"},{"issue":"8","key":"881_CR30","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1007\/s11276-011-0383-2","volume":"17","author":"C Zhang","year":"2011","unstructured":"Zhang, C., Ho, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(8), 1851\u20131865.","journal-title":"Wireless Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-014-0881-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-014-0881-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-014-0881-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T17:56:54Z","timestamp":1566151014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-014-0881-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,23]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["881"],"URL":"https:\/\/doi.org\/10.1007\/s11276-014-0881-0","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,23]]}}}