{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:44:45Z","timestamp":1725612285974},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2010,8,20]],"date-time":"2010-08-20T00:00:00Z","timestamp":1282262400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/s11432-010-4065-y","type":"journal-article","created":{"date-parts":[[2010,8,20]],"date-time":"2010-08-20T07:15:20Z","timestamp":1282288520000},"page":"1996-2004","source":"Crossref","is-referenced-by-count":3,"title":["A framework of physical layer technique assisted authentication for vehicular communication networks"],"prefix":"10.1007","volume":"53","author":[{"given":"Hong","family":"Wen","sequence":"first","affiliation":[]},{"given":"PinHan","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,20]]},"reference":[{"key":"4065_CR1","unstructured":"Task Group p. IEEE P802.11p: Draft standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements, Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. USA IEEE Computer Society, 2009"},{"key":"4065_CR2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"2","author":"J. P. Hubaux","year":"2004","unstructured":"Hubaux J P. The security and privacy of smart vehicles. IEEE Secur Priv, 2004, 2: 49\u201355","journal-title":"IEEE Secur Priv"},{"key":"4065_CR3","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M. Raya","year":"2007","unstructured":"Raya M, Hubaux J P. Securing vehicular ad hoc networks. J Comput Secur, 2007, 15: 39\u201368","journal-title":"J Comput Secur"},{"key":"4065_CR4","doi-asserted-by":"crossref","unstructured":"Dotzer F. Privacy issues in vehicular ad hoc networks. In: Proceeding of ACM Workshop on Vehicular Ad Hoc Networks, Los Angeles, California, USA, 2006. 45\u201352","DOI":"10.1007\/11767831_13"},{"key":"4065_CR5","unstructured":"Moustafa H, Bourdon G, Gourhant Y. AAA in vehicular communication on highways with ad hoc networking support: a proposed architecture. In: Proceeding of ACM Workshop on Vehicular Ad hoc Networks, Cologne, Germany, 2005. 79\u201380"},{"key":"4065_CR6","doi-asserted-by":"crossref","unstructured":"Zhang C, Lu R, Lin X, et al. An efficient identity-based batch verification scheme for vehicular sensor networks. In: Proceeding of IEEE Infocom, Phoenix, AZ, USA, 2008. 246\u2013250","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"4065_CR7","doi-asserted-by":"crossref","first-page":"4987","DOI":"10.1109\/T-WC.2008.070773","volume":"7","author":"X. D. Lin","year":"2009","unstructured":"Lin X D, Sun X T, Wang X Y, et al. TSVC: Timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wirel Commun, 2009, 7: 4987\u20134998","journal-title":"IEEE Trans Wirel Commun"},{"key":"4065_CR8","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1109\/TIT.2003.820010","volume":"49","author":"A. O. Hero","year":"2003","unstructured":"Hero A O. Secure space-time communication. IEEE Trans Inf Theory, 2003, 49: 3235\u20133249","journal-title":"IEEE Trans Inf Theory"},{"key":"4065_CR9","first-page":"24","volume":"2","author":"X. H. Li","year":"2007","unstructured":"Li X H, Hwu J. Using antenna array redundancy and channel diversity for secure wireless transmissions. J Commun, 2007, 2: 24\u201332","journal-title":"J Commun"},{"key":"4065_CR10","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M. Nloch","year":"2008","unstructured":"Nloch M, Barros J, Rodrigues M R D. Wireless information theoretic security. IEEE Trans Inf Theory, 2008, 54: 2515\u20132534","journal-title":"IEEE Trans Inf Theory"},{"key":"4065_CR11","doi-asserted-by":"crossref","first-page":"2571","DOI":"10.1109\/TWC.2008.070194","volume":"7","author":"L. Xiao","year":"2008","unstructured":"Xiao L, Greenstein L, Mandayam N, et al. Using the physical layer for wireless authentication in time-variant channels. IEEE Trans Wirel Commun, 2008, 7: 2571\u20132579","journal-title":"IEEE Trans Wirel Commun"},{"key":"4065_CR12","doi-asserted-by":"crossref","unstructured":"Xiao L, Greenstein L, Mandayam N, et al. A physical-layer technique to enhance authentication for mobile terminals. In: Proceeding of IEEE International Conference on Communications, Beijing, China, 2008. 1520\u20131524","DOI":"10.1109\/ICC.2008.294"},{"key":"4065_CR13","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1007\/s11432-009-0158-x","volume":"52","author":"Z. Y. Hu","year":"2009","unstructured":"Hu Z Y, Sun FC, Jiang J C. Ciphertext verification security of symmetric encryption schemes. Sci China Ser F-Inf Sci, 2009, 52: 1617\u20131631","journal-title":"Sci China Ser F-Inf Sci"},{"key":"4065_CR14","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1007\/s11432-009-0135-4","volume":"52","author":"S. B. Wang","year":"2009","unstructured":"Wang S B, Cao Z F, Cheng Z H, et al. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Sci China Ser F-Inf Sci, 2009, 52: 1358\u20131370","journal-title":"Sci China Ser F-Inf Sci"},{"key":"4065_CR15","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/26.701321","volume":"46","author":"O. Edfors","year":"1998","unstructured":"Edfors O, Sandell M, Van J J, et al. OFDM channel estimation by singular value decomposition. IEEE Trans Commun, 1998, 46: 931\u2013939","journal-title":"IEEE Trans Commun"},{"key":"4065_CR16","doi-asserted-by":"crossref","unstructured":"Hoeher P, Kaiser S, Robertson P. Pilot-symbol-aided channel estimation in time and frequency. In: Proceeding of IEEE Global Telecommunication, Arizons, USA, 1997. 90\u201396","DOI":"10.1007\/978-1-4615-6231-3_20"},{"key":"4065_CR17","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/26.701317","volume":"46","author":"Y. Li","year":"1998","unstructured":"Li Y, Cimini Leonard J. Robust channel estimation for OFDM systems with rapid dispersive fading channels. IEEE Trans Commun, 1998, 46: 902\u2013915","journal-title":"IEEE Trans Commun"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-4065-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-010-4065-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-010-4065-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T03:54:37Z","timestamp":1559447677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-010-4065-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,20]]},"references-count":17,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["4065"],"URL":"https:\/\/doi.org\/10.1007\/s11432-010-4065-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,20]]}}}