{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:42Z","timestamp":1775744982188,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11276-019-02039-x","type":"journal-article","created":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T19:02:32Z","timestamp":1559761352000},"page":"3083-3098","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":85,"title":["NERA: A new and efficient RSU based authentication scheme for VANETs"],"prefix":"10.1007","volume":"26","author":[{"given":"Majid","family":"Bayat","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Pournaghi","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Rahimi","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Barmshoory","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"2039_CR1","doi-asserted-by":"crossref","first-page":"5563","DOI":"10.1007\/s11042-017-4469-4","volume":"77","author":"QA Arain","year":"2017","unstructured":"Arain, Q. A., Memon, I., Deng, Z., Memon, M. H., Mangi, F., & Zubedi, A. A. (2017). Location monitoring approach: Multiple mix-zones with location privacy protection based on traffic flow over road networks. Multimedia Tools and Applications, 77, 5563\u20135607.","journal-title":"Multimedia Tools and Applications"},{"key":"2039_CR2","first-page":"1","volume":"95","author":"QA Arain","year":"2016","unstructured":"Arain, Q. A., Zhongliang, D., Memon, I., Arain, S., Shaikh, F. K., Zubedi, A., et al. (2016). Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Personal Communications, 95, 1\u201317.","journal-title":"Wireless Personal Communications"},{"key":"2039_CR3","volume-title":"JiST\/SWANS, wireless networks laboratory","author":"R Barr","year":"2005","unstructured":"Barr, R., & Haas, Z. J. (2005). JiST\/SWANS, wireless networks laboratory. Ithaca: Cornell University."},{"issue":"Num 5","key":"2039_CR4","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2015","unstructured":"Bayat, M., Barmshoory, M., Rahimi, M., & Aref, M. R. (2015). A secure authentication scheme for VANETs with batch verification. Wireless Networks, 21(Num 5), 1733\u20131743.","journal-title":"Wireless Networks"},{"issue":"11","key":"2039_CR5","doi-asserted-by":"crossref","first-page":"10419","DOI":"10.1109\/TVT.2017.2750803","volume":"66","author":"A Bazzi","year":"2017","unstructured":"Bazzi, A., Masini, B. M., Zanella, A., & Thibault, I. (2017). On the performance of IEEE 802.11 p and LTE-V2V for the cooperative awareness of connected vehicles. IEEE Transactions on Vehicular Technology, 66(11), 10419\u201310432.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2039_CR6","first-page":"67","volume":"93","author":"M Bellare","year":"1993","unstructured":"Bellare, M., & Rogaway, P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the CCS, 93, 67\u201373.","journal-title":"Proceedings of the CCS"},{"issue":"Num 2\u20133","key":"2039_CR7","first-page":"177","volume":"10","author":"SM Biswas","year":"2010","unstructured":"Biswas, S. M., Haque, M., & Misic, J. V. (2010). Privacy and anonymity in VANETs: A contemporary study. Ad Hoc Sensor Wireless Networks, 10(Num 2\u20133), 177\u2013192.","journal-title":"Ad Hoc Sensor Wireless Networks"},{"issue":"Num 10","key":"2039_CR8","first-page":"16-16","volume":"45","author":"J Blau","year":"2008","unstructured":"Blau, J. (2008). Car talk-[update], spectrum. IEEE, 45(Num 10), 16-16.","journal-title":"IEEE"},{"key":"2039_CR9","first-page":"514","volume":"2248","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the weil pairing. Proceedings of Asiacrypt, 2248, 514\u2013532.","journal-title":"Proceedings of Asiacrypt"},{"key":"2039_CR10","doi-asserted-by":"crossref","unstructured":"Boyen, X., & Waters, B. (2006). Compact group signatures without random oracles. In Advances in cryptology-EUROCRYPT 2006 (pp. 427-444).","DOI":"10.1007\/11761679_26"},{"key":"2039_CR11","unstructured":"CAMP Vehicle Safety Communications Consortium. (2005). Vehicle safety communications project: Task 3 final report: identify intelligent vehicle safety applications enabled by DSRC. National Highway Traffic Safety Administration, US Department of Transportation, Washington DC"},{"issue":"Num 7","key":"2039_CR12","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1016\/j.adhoc.2012.03.020","volume":"10","author":"TW Chim","year":"2012","unstructured":"Chim, T. W., Yiu, S. M., Hui, L. C., & Li, V. O. K. (2012). MLAS: Multiple level authentication scheme for VANETs. Ad Hoc Networks, 10(Num 7), 1445\u20131456.","journal-title":"Ad Hoc Networks"},{"key":"2039_CR13","unstructured":"Dedicated Short Range Communications (5.9 GHz DSRC). Available from:\nhttp:\/\/www.leearmstrong.com\/DSRC\/DSRCHomeset.htm\n\n."},{"key":"2039_CR14","volume-title":"Vehicular ad-hoc networks VANETs simulator and hierarchical clustering algorithm","author":"E Dror","year":"2011","unstructured":"Dror, E. (2011). Vehicular ad-hoc networks VANETs simulator and hierarchical clustering algorithm. Beersheba: Ben-Gurion University of the Negev."},{"key":"2039_CR15","unstructured":"Fall, K., Varadhan, K., (2011). ns Notes and documents. URL: \nhttp:\/\/www.isi.edu\/nsnam\/ns\/ns-documentation.html\n\n."},{"issue":"Num 3","key":"2039_CR16","first-page":"361","volume":"13","author":"R Gennaro","year":"2000","unstructured":"Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., & Rabin, T. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(Num 3), 361\u2013396.","journal-title":"Journal of Cryptology"},{"key":"2039_CR17","doi-asserted-by":"crossref","unstructured":"Guo, J., Baugh, J. P., & Wang, S. (2007). A group signature based secure and privacy-preserving vehicular communication framework. In Proceedings of the mobile networking for vehicular environments (pp. 103\u2013108).","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"2039_CR18","doi-asserted-by":"crossref","unstructured":"Horng, S.J., Tzeng, S. F., Pan, Y., Fan, P., Wang, X., Li, T., & Khan, M. K., (2013). b-SPECS+: Batch verification for secure pseudonymous authentication in VANET. In IEEE transactions on information forensics and security (pp. 1860\u20131875).","DOI":"10.1109\/TIFS.2013.2277471"},{"issue":"Num 4","key":"2039_CR19","first-page":"3235","volume":"66","author":"SJ Horng","year":"2017","unstructured":"Horng, S. J., Tzeng, S. F., Li, T., Wang, X., Huang, P. H., & Khan, M. K. (2017). Enhancing security and privacy for identity-based batch verification scheme in VANET. IEEE Transactions on Vehicular Technology, 66(Num 4), 3235\u20133248.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2039_CR20","doi-asserted-by":"crossref","unstructured":"Hsin-Te, W., Li, W.-S. , Tung-Shih, S., & Hsiehz, W.-S. (2010). A novel RSU-based message authentication scheme for VANET. In Fifth international conference on systems and networks communications, IEEE (pp. 111\u2013116).","DOI":"10.1109\/ICSNC.2010.23"},{"issue":"3","key":"2039_CR21","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1109\/TITS.2011.2156790","volume":"12","author":"D Huang","year":"2011","unstructured":"Huang, D., Misra, S., Verma, M., & Xue, G. (2011). PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs. IEEE Transactions on Intelligent Transportation Systems, 12(3), 736\u2013746.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"9","key":"2039_CR22","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2012.04.002","volume":"56","author":"C Hu","year":"2012","unstructured":"Hu, C., Chim, T. W., Yiu, S.-M., Hui, L. C. K., & Li, V. O. K. (2012). Efficient HMAC-based secure communication for VANETs. Computer Networks, 56(9), 2292\u20132303.","journal-title":"Computer Networks"},{"key":"2039_CR23","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1007\/s12083-016-0473-0","volume":"10","author":"H Hu","year":"2016","unstructured":"Hu, H., Lu, R., Huang, C., & Zhang, Z. (2016). PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Networking and Applications, 10, 1204\u20131218.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"2039_CR24","doi-asserted-by":"publisher","unstructured":"IEEE Std 1609.2-2013 (Revision of IEEE Std 1609.2-2006) (2013), 1\u2013289. \nhttps:\/\/doi.org\/10.1109\/IEEESTD.2013.6509896\n\n.","DOI":"10.1109\/IEEESTD.2013.6509896"},{"key":"2039_CR25","first-page":"1441","volume":"1\u20139","author":"CC Lee","year":"2013","unstructured":"Lee, C. C., & Lai, Y. Y. (2013). Toward a secure batch verification with group testing for VANET. Wireless Networks, 1\u20139, 1441\u20131449.","journal-title":"Wireless Networks"},{"issue":"Num 4","key":"2039_CR26","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/TPDS.2014.2308215","volume":"26","author":"J Li","year":"2015","unstructured":"Li, J., Lu, H., & Guizani, M. (2015). ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs. IEEE Transactions on Parallel and Distributed Systems, 26(Num 4), 938\u2013948.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"Num 6","key":"2039_CR27","first-page":"3442","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin, X., Sun, X., Ho, P. H., & Shen, X. (2007). GSIS: A secure and privacy-preserving protocol for vehicular communications, IEEE Transactions on Vehicular Technology, 56(Num 6), 3442\u20133456.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2039_CR28","doi-asserted-by":"crossref","first-page":"e3317","DOI":"10.1002\/dac.3317","volume":"30","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Guo, W., Zhong, Q., & Yao, G. (2017). LVAP: Lightweight V2I authentication protocol using group communication in VANETs. International Journal of Communication Systems, 30, e3317.","journal-title":"International Journal of Communication Systems"},{"issue":"Num 8","key":"2039_CR29","doi-asserted-by":"crossref","first-page":"3697","DOI":"10.1109\/TVT.2014.2358633","volume":"64","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Wang, L., & Chen, H. H. (2015). Message authentication using proxy vehicles in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64(Num 8), 3697\u20133710.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"2039_CR30","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TITS.2011.2164068","volume":"13","author":"R Lu","year":"2012","unstructured":"Lu, R., Lin, X., Liang, X., & Shen, X. (2012). A dynamic privacy-preserving key management scheme for location based services in VANETs. IEEE Transactions on Intelligent Transportation Systems, 13(1), 127\u2013139.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"2039_CR31","first-page":"1229","volume":"2008","author":"R Lu","year":"2008","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P. H., & Shen, X. (2008). ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. Proceedings INFOCOM, 2008, 1229\u20131237.","journal-title":"Proceedings INFOCOM"},{"key":"2039_CR32","volume-title":"Modern cryptography: Theory and practice","author":"W Mao","year":"2003","unstructured":"Mao, W. (2003). Modern cryptography: Theory and practice. Bengaluru: Pearson Education India."},{"issue":"7","key":"2039_CR33","doi-asserted-by":"crossref","first-page":"2207","DOI":"10.3390\/s18072207","volume":"18","author":"B Masini","year":"2018","unstructured":"Masini, B., Bazzi, A., & Zanella, A. A. (2018). Survey on the roadmap to mandate on board connectivity and enable V2V-based vehicular sensor networks. Sensors, 18(7), 2207.","journal-title":"Sensors"},{"issue":"3","key":"2039_CR34","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1007\/s11277-015-2833-0","volume":"85","author":"I Memon","year":"2015","unstructured":"Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167\u20131191.","journal-title":"Wireless Personal Communications"},{"key":"2039_CR35","doi-asserted-by":"crossref","first-page":"24359","DOI":"10.1007\/s11042-016-4154-z","volume":"76","author":"I Memon","year":"2016","unstructured":"Memon, I., Ali, Q., Zubedi, A., & Mangi, F. A. (2016). DPMM: Dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimedia Tools and Applications, 76, 24359\u201324388.","journal-title":"Multimedia Tools and Applications"},{"key":"2039_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11277-017-4022-9","volume":"95","author":"I Memon","year":"2017","unstructured":"Memon, I., Arain, Q. A., Memon, H., & Mangi, F. A. (2017). Efficient user based authentication protocol for location based services discovery over road networks. Wireless Personal Communications, 95, 1\u201320.","journal-title":"Wireless Personal Communications"},{"key":"2039_CR37","doi-asserted-by":"crossref","first-page":"e3312","DOI":"10.1002\/dac.3312","volume":"30","author":"I Memon","year":"2017","unstructured":"Memon, I., Arain, Q. A., Memon, M. H., Mangi, F. A., & Akhtar, R. (2017). Search me if you can: Multiple mix zones with location privacy protection for mapping services. International Journal of Communication Systems, 30, e3312.","journal-title":"International Journal of Communication Systems"},{"issue":"Num 2","key":"2039_CR38","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1007\/s11277-015-2699-1","volume":"84","author":"I Memon","year":"2015","unstructured":"Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme, Wireless Personal Communications, 84(Num 2), 1487\u20131508.","journal-title":"Wireless Personal Communications"},{"issue":"Num 1","key":"2039_CR39","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1007\/s11277-014-1879-8","volume":"79","author":"I Memon","year":"2014","unstructured":"Memon, I., Mohammed, M. R., Akhtar, R., Memon, H., Memon, M. H., & Shaikh, R. A. (2014). Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wireless Personal Communications, 79(Num 1), 661\u2013686.","journal-title":"Wireless Personal Communications"},{"key":"2039_CR40","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/0167-8191(94)90117-1","volume":"20","author":"K Nagel","year":"1994","unstructured":"Nagel, K., & Schleicher, A. (1994). Microscopic traffic modeling on parallel high performance computers. Parallel Computing, 20, 125\u2013146. \nhttps:\/\/doi.org\/10.1016\/0167-8191(94)90117-1\n\n.","journal-title":"Parallel Computing"},{"issue":"Num 3","key":"2039_CR41","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(Num 3), 361\u2013396.","journal-title":"Journal of Cryptology"},{"key":"2039_CR42","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.comnet.2018.01.015","volume":"134","author":"SM Pournaghi","year":"2018","unstructured":"Pournaghi, S. M., Zahednejad, B., Bayat, M., & Farjami, Y. (2018). NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET. Computer Networks, 134, 78\u201392.","journal-title":"Computer Networks"},{"issue":"Num 6","key":"2039_CR43","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","volume":"16","author":"F Qu","year":"2015","unstructured":"Qu, F., Wu, Z., Wang, F., & Cho, W. (2015). A security and privacy review of VANETs. IEEE Transactions on Intelligent Transportation Systems, 16(Num 6), 2985\u20132996.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"2039_CR44","doi-asserted-by":"crossref","unstructured":"Raya, M , & Hubaux, J. P. (2005). The security of vehicular ad hoc networks. In 3rd ACM workshop on Security of ad hoc and sensor networks (pp. 11\u201321).","DOI":"10.1145\/1102219.1102223"},{"issue":"Num 1,","key":"2039_CR45","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15(Num 1,), 39\u201368.","journal-title":"Journal of Computer Security"},{"issue":"6","key":"2039_CR46","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCOM.2016.7497762","volume":"54","author":"H Seo","year":"2016","unstructured":"Seo, H., Lee, K.-D., Yasukawa, S., Peng, Y., & Sartori, P. (2016). LTE evolution for vehicle-to-everything services. IEEE communications magazine, 54(6), 22\u201328.","journal-title":"IEEE communications magazine"},{"key":"2039_CR47","doi-asserted-by":"crossref","unstructured":"Shacham, H., & Waters, B., (2007). Efficient ring signatures without random oracles. In PKC.","DOI":"10.1007\/978-3-540-71677-8_12"},{"issue":"Num 3","key":"2039_CR48","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","volume":"65","author":"J Shao","year":"2016","unstructured":"Shao, J., Lin, X., Lu, R., & Zuo, C. (2016). A threshold anonymous authentication protocol for VANETs, IEEE Transactions on Vehicular Technology, 65(Num 3), 1711\u20131720.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2039_CR49","doi-asserted-by":"crossref","unstructured":"Sun, X., Lin, X., & Ho, P. H. (2007) Secure vehicular communications based on group signature and ID-based signature scheme. In ICC 2007, Moscow, Russia (pp. 1539\u20131545).","DOI":"10.1109\/ICC.2007.258"},{"key":"2039_CR50","doi-asserted-by":"crossref","unstructured":"Toghi, B., Saifuddin, M.D., Mahjoub, H. N., Mughal, M. O., Fallah, Y. P., Rao, J., Das, S. (2018). Multiple access in cellular V2X: Performance analysis in highly congested vehicular networks. In IEEE vehicular networking conference (VNC) (pp. 1\u20138).","DOI":"10.1109\/VNC.2018.8628416"},{"key":"2039_CR51","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.comnet.2017.08.025","volume":"129","author":"E Vahedi","year":"2017","unstructured":"Vahedi, E., Bayat, M., Pakravan, M. R., & Aref, M. R. (2017). A secure ECC-based privacy preserving data aggregation scheme for smart grids. Computer Networks, 129, 28\u201336.","journal-title":"Computer Networks"},{"key":"2039_CR52","volume-title":"A staged network simulator (SNS)","author":"K Walsh","year":"2003","unstructured":"Walsh, K., & Sirer, E. (2003). A staged network simulator (SNS). Ithaca: Computer Science Department, Cornell University."},{"issue":"Num 2","key":"2039_CR53","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TVT.2015.2402166","volume":"65","author":"F Wang","year":"2016","unstructured":"Wang, F., Xu, Y., Zhang, H., Zhang, Y., & Zhu, L. (2016). 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular Technology, 65(Num 2), 896\u2013911.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"Num 2","key":"2039_CR54","first-page":"374","volume":"18","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Zhong, H., Xu, Y., & Cui, J. (2016). ECPB: Efficient conditional privacy-preserving authentication scheme supporting batch verification for VANETs, International Journal of Network Security, 18(Num 2), 374\u2013382.","journal-title":"International Journal of Network Security,"},{"key":"2039_CR55","doi-asserted-by":"crossref","first-page":"5460","DOI":"10.1002\/sec.1710","volume":"9","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Zhong, H., Xu, Y., Cui, J., & Guo, F. (2017). Efficient extensible conditional privacypreserving authentication scheme supporting batch verification for VANETs. Security and Communication Networks, 9, 5460\u20135471.","journal-title":"Security and Communication Networks"},{"issue":"Num 2","key":"2039_CR56","first-page":"553","volume":"59","author":"A Wasef","year":"2010","unstructured":"Wasef, A., Jiang, Y., & Shen, X. (2010). An efficient distributed certificate service scheme for vehicular networks. IEEE Transactions on Vehicular Technology, 59(Num 2), 553.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"2","key":"2039_CR57","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s11042-011-0792-3","volume":"66","author":"H-T Wu","year":"2013","unstructured":"Wu, H.-T., & Hsieh, W.-S. (2013). RSU-based message authentication for vehicular ad-hoc networks. Multimedia Tools and Applications, 66(2), 215\u2013227.","journal-title":"Multimedia Tools and Applications"},{"key":"2039_CR58","doi-asserted-by":"crossref","unstructured":"Xiong, H., Beznosov, K., Qin, Z., & Ripeanu, M. (2010). Efficient and spontaneous privacy-preserving protocol for secure vehicular communication. In IEEE-ICC, Cape Town, South Africa (pp. 1\u20136).","DOI":"10.1109\/ICC.2010.5502673"},{"issue":"38","key":"2039_CR59","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1016\/j.compeleceng.2011.11.009","volume":"Num 3","author":"H Xiong","year":"2012","unstructured":"Xiong, H., Chen, Z., & Li, F. (2012). Efficient and multi-level privacy-preserving communication protocol for VANET. Computers and Electrical Engineering, Num 3(38), 573\u2013581.","journal-title":"Computers and Electrical Engineering"},{"key":"2039_CR60","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1002\/sec.305","volume":"5","author":"X Xue","year":"2012","unstructured":"Xue, X., & Ding, J. (2012). LPA: A new location-based privacy-preserving authentication protocol in VANET. Security and Communication Networks, 5, 69\u201378.","journal-title":"Security and Communication Networks"},{"key":"2039_CR61","unstructured":"Zeng, X., Bagrodia, R., & Gerla, M., (1998). GloMoSim: A library for parallel simulation of large-scale wireless networks. In: Twelfth workshop on parallel and distributed simulation, 1998. PADS 98. Proceedings. IEEE (pp. 154\u2013161)."},{"key":"2039_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R. , & Ho, P.-H. (2008). RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In IEEE international conference on communications (pp. 1451\u20131457).","DOI":"10.1109\/ICC.2008.281"},{"key":"2039_CR63","doi-asserted-by":"crossref","unstructured":"Zhang, J., Ma, L., Su, W., & Wang, Y., (2007). Privacy-preserving authentication based on short group signature in vehicular networks. In The first international Symposium on , data, privacy, and E-commerce, ISDPE 2007.","DOI":"10.1109\/ISDPE.2007.53"},{"issue":"num 8","key":"2039_CR64","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1007\/s11276-011-0383-2","volume":"17","author":"C Zhang","year":"2011","unstructured":"Zhang, C., Ho Tapolcai J, P. H., & Tapolcai, J. (2011). On batch verification with group testing for vehicular communications. Wireless Networks, 17(num 8), 1851\u20131865.","journal-title":"Wireless Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02039-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-019-02039-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02039-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T23:19:35Z","timestamp":1591226375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-019-02039-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,5]]},"references-count":64,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["2039"],"URL":"https:\/\/doi.org\/10.1007\/s11276-019-02039-x","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,5]]},"assertion":[{"value":"5 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}