{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:35:21Z","timestamp":1762004121819,"version":"3.35.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2008,11,1]],"date-time":"2008-11-01T00:00:00Z","timestamp":1225497600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1007\/s11390-008-9194-z","type":"journal-article","created":{"date-parts":[[2008,11,21]],"date-time":"2008-11-21T19:48:57Z","timestamp":1227296937000},"page":"916-928","source":"Crossref","is-referenced-by-count":18,"title":["Probabilistic Adaptive Anonymous Authentication in Vehicular Networks"],"prefix":"10.1007","volume":"23","author":[{"given":"Yong","family":"Xi","sequence":"first","affiliation":[]},{"given":"Ke-Wei","family":"Sha","sequence":"additional","affiliation":[]},{"given":"Wei-Song","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Loren","family":"Schwiebert","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,23]]},"reference":[{"key":"9194_CR1","unstructured":"Vehicle infrastructure integration. U.S. Department of Transportation, 2006, http:\/\/www.its.dot.gov\/vii\/docs\/vii_factsheet.pdf ."},{"key":"9194_CR2","doi-asserted-by":"crossref","unstructured":"Bishop R. A survey of intelligent vehicle applications worldwide. In Proc. IEEE Intelligent Vehicles Symposium 2000, Dearborn, MI, USA, Oct. 2000, pp.25\u201330.","DOI":"10.1109\/IVS.2000.898313"},{"key":"9194_CR3","unstructured":"National intelligent transportation systems program plan: A ten-year vision. A Report from Intelligent Transportation Society of America and Department of Transportation. ITSA, DoT, 2002, http:\/\/www.itsa.org\/itsa\/files\/pdf\/National10YearPlanITSFull.pdf ."},{"key":"9194_CR4","doi-asserted-by":"crossref","unstructured":"Mak T, Laberteaux K, Sengupta R. A multi-channel VANET providing concurrent safety and commercial services. In Proc. the 2nd ACM International Workshop on Vehicular Ad Hoc Networks, Cologne, Germany, Sept. 2005, pp.1\u20139.","DOI":"10.1145\/1080754.1080756"},{"key":"9194_CR5","unstructured":"Dedicated Short Range Communications (DSRC) home. DSRC, 2006, http:\/\/grouper.ieee.org\/groups\/scc32\/dsrc\/ ."},{"issue":"3","key":"9194_CR6","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"4","author":"J Hubaux","year":"2004","unstructured":"Hubaux J, Capkun S, Luo J. The security and privacy of smart vehicles. IEEE Security and Privacy, 2004, 4(3): 49\u201355.","journal-title":"IEEE Security and Privacy"},{"key":"9194_CR7","doi-asserted-by":"crossref","unstructured":"Raya M, Hubaux J. The security of vehicular ad hoc networks. In Proc. the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA, Nov. 2005, pp.11\u201321.","DOI":"10.1145\/1102219.1102223"},{"key":"9194_CR8","doi-asserted-by":"crossref","unstructured":"D\u00f6tzer F. Privacy issues in vehicular ad hoc networks. In Proc. Workshop on Privacy Enhancing Technologies, Dubrovnik, Croatia, May 2005, pp.197\u2013209.","DOI":"10.1007\/11767831_13"},{"key":"9194_CR9","doi-asserted-by":"crossref","unstructured":"Choi J, Jakobsson M, Wetzel S. Balancing auditability and privacy in vehicular networks. In Proc. the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, Montreal, Canada, Oct. 2005, pp.79\u201387.","DOI":"10.1145\/1089761.1089775"},{"key":"9194_CR10","unstructured":"Sampigethaya K et al. CARAVAN: Providing location privacy for VANET. In Proc. Embedded Security in Cars (ESCAR), Cologne, Germany, Nov. 2005."},{"key":"9194_CR11","doi-asserted-by":"crossref","unstructured":"Sun X, Lin X, Ho P P. Secure vehicular communications based on group signature and id-based signature scheme. In Proc. International Conference on Communications (ICC), Glasgow, Scotland, Jun. 2007, pp.1539\u20131545.","DOI":"10.1109\/ICC.2007.258"},{"key":"9194_CR12","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin X, Sun X, Ho P P, Shen X. GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Technology, Nov. 2007, 56: 3442\u20133456.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"9194_CR13","doi-asserted-by":"crossref","unstructured":"Guo J, Baugh J, Wang S. A group signature based secure and privacy-preserving vehicular communication framework. In Proc. the Mobile Networking for Vehicular Environments (MOVE) Workshop in Conjunction with IEEE INFOCOM, Anchorage, Alaska, USA, May 2007, pp.103\u2013108.","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"9194_CR14","doi-asserted-by":"crossref","unstructured":"Fonseca E, Festag A, Baldessari R, Aguiar R. Support of anonymity in VANETs \u2014 putting pseudonymity into practice. In Proc. IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong, China, March 2007, pp.3400\u20133405.","DOI":"10.1109\/WCNC.2007.625"},{"key":"9194_CR15","doi-asserted-by":"crossref","unstructured":"Calandriello G, Papadimitratos P, Lloy A, Hubaux J P. Efficient and robust pseudonymous authentication in VANET. In Proc. the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2007), in Conjunction with ACM MobiCom 2007, Montreal, Canada, 2007, pp.19\u201328.","DOI":"10.1145\/1287748.1287752"},{"key":"9194_CR16","doi-asserted-by":"crossref","unstructured":"Gedik B, Liu L. Location privacy in mobile systems: A personalized anonymization model. In Proc. the 25th International Conference on Distributed Computing Systems, Columbus, Ohio, USA, Jun. 2005, pp.620\u2013629.","DOI":"10.1109\/ICDCS.2005.48"},{"issue":"6","key":"9194_CR17","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TAC.1979.1102177","volume":"24","author":"D B Reid","year":"1979","unstructured":"Reid D B. An algorithm for tracking multiple targets. IEEE Transactions on Automatic Control, Dec. 1979, 24(6): 843\u2013854.","journal-title":"IEEE Transactions on Automatic Control"},{"key":"9194_CR18","doi-asserted-by":"crossref","unstructured":"Rivest R L, Shamir A, Tauman Y. How to leak a secret. Lecture Notes in Computer Science 2248, 2001, pp.552\u2013565. http:\/\/citeseer.ist.psu.edu\/rivest01how.html .","DOI":"10.1007\/3-540-45682-1_32"},{"key":"9194_CR19","doi-asserted-by":"crossref","unstructured":"Schechter S, Parnell T, Hartemink A. Anonymous authentication of membership in dynamic groups. In Proc. the Third International Conference on Financial Data Security and Digital Commerce, Anguilla, British West Indies, Jan. 1999, pp.184\u2013195.","DOI":"10.1007\/3-540-48390-X_14"},{"key":"9194_CR20","unstructured":"Auto theft key statistics. Insurance Information Institute, 2007, http:\/\/www.iii.org\/ ."},{"key":"9194_CR21","unstructured":"GM OnStar System Could Halt Stolen Cars. Associated Press, 2007."},{"key":"9194_CR22","doi-asserted-by":"crossref","unstructured":"Zeng X, Bagrodia R, Gerla M. GloMoSim: A library for parallel simulation of large-scale wireless networks. In Proc. Workshop on Parallel and Distributed Simulation, Banff, Alberta, Canada, 1998, pp.154\u2013161.","DOI":"10.1145\/278009.278027"},{"key":"9194_CR23","doi-asserted-by":"crossref","unstructured":"Yin J, ElBatt T, Yeung G, Ryu B, Habermas S, Krishnan H, Talty T. Performance evaluation of safety applications over DSRC vehicular ad hoc networks. In Proc. the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, Oct. 2004, pp.1\u20139.","DOI":"10.1145\/1023875.1023877"},{"key":"9194_CR24","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. ACM MobiSys'03, San Francisco, CA, USA, May 2003, pp.31\u201342.","DOI":"10.1145\/1066116.1189037"},{"issue":"4","key":"9194_CR25","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1109\/TITS.2005.858623","volume":"6","author":"T Munaka","year":"2005","unstructured":"Munaka T, Yamamoto T, Watanabe T. A reliable advanced-join system for data multicasting in its networks. IEEE Transactions on Intelligent Transportation Systems, Dec. 2005, 6(4): 424\u2013437.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"9194_CR26","unstructured":"TrafNet: Real-time seattle area traffic conditions over the Internet. University of Washington, 2006, http:\/\/www. its.washington.edu\/trafnet\/ ."},{"key":"9194_CR27","unstructured":"Aijaz A, Bochow B, D\u00f6tzer F, Festag A, Gerlach M, Kroh R. Attacks on inter-vehicle communication systems \u2014 An analysis. In Proc. 3rd International Workshop on Intelligent Transportation (WIT 2006), Hamburg, Germany, March 2006."},{"key":"9194_CR28","unstructured":"Zarki M, Mehrotra S, Tsudik G, Venkatasubramanian N. Security issues in a future vehicular network. In Proc. EuroWireless 2002, Florence, Italy, Feb. 2002."},{"issue":"4","key":"9194_CR29","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/TVT.2006.877704","volume":"55","author":"K Ren","year":"2006","unstructured":"Ren K et al. A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular Technology, 2006, 55(4): 1373\u20131384.","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-008-9194-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-008-9194-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-008-9194-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,3]],"date-time":"2025-02-03T03:57:28Z","timestamp":1738555048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-008-9194-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2008,11]]}},"alternative-id":["9194"],"URL":"https:\/\/doi.org\/10.1007\/s11390-008-9194-z","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2008,11]]}}}