{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:48:47Z","timestamp":1775188127308,"version":"3.50.1"},"reference-count":96,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T00:00:00Z","timestamp":1504656000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11432-017-9203-x","type":"journal-article","created":{"date-parts":[[2017,9,13]],"date-time":"2017-09-13T14:32:45Z","timestamp":1505313165000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey"],"prefix":"10.1007","volume":"60","author":[{"given":"Taimur","family":"Khan","sequence":"first","affiliation":[]},{"given":"Naveed","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Syed Asim","family":"Jalal","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Asif","sequence":"additional","affiliation":[]},{"given":"Sana ul","family":"Haq","sequence":"additional","affiliation":[]},{"given":"Haitham","family":"Cruichshank","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,6]]},"reference":[{"key":"9203_CR1","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","volume":"37","author":"S Al-Sultan","year":"2014","unstructured":"Al-Sultan S, Al-Doori M M, Al-Bayatti A H, et al. A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl, 2014, 37: 380\u2013392","journal-title":"J Netw Comput Appl"},{"key":"9203_CR2","first-page":"1","volume-title":"Proceedings of Global Telecommunications Conference (GLOBECOM 2010), Miami","author":"K A Hafeez","year":"2010","unstructured":"Hafeez K A, Zhao L, Liao Z, at al. Impact of mobility on VANETS safety applications. In: Proceedings of Global Telecommunications Conference (GLOBECOM 2010), Miami, 2010. 1\u20135"},{"key":"9203_CR3","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/COMST.2008.4625806","volume":"10","author":"Y Toor","year":"2008","unstructured":"Toor Y, Muhlethaler P, Laouiti A, et al. Vehicle ad hoc networks: applications and related technical issues. IEEE Commun Surv Tut, 2008, 10: 74\u201388","journal-title":"IEEE Commun Surv Tut"},{"key":"9203_CR4","volume-title":"Proceedings of the Transport Research Arena (TRA) 5th Conference: Transport Solutions from Research to Deployment","author":"T Foss","year":"2014","unstructured":"Foss T. Safe and secure intelligent transport systems (ITS). In: Proceedings of the Transport Research Arena (TRA) 5th Conference: Transport Solutions from Research to Deployment, Paris, 2014"},{"key":"9203_CR5","volume-title":"US Patent, 12\/607782","author":"M Felt","year":"2009","unstructured":"Felt M, Gharachorloo N, Moshrefi A. Mobile taxi dispatch system. US Patent, 12\/607782, 2009-10-28"},{"key":"9203_CR6","volume-title":"IEEE Trans Syst Man Cyber Syst","author":"Y Cao","year":"2016","unstructured":"Cao Y, Wang T, Kaiwartya O, et al. An ev charging management system concerning drivers\u2019 trip duration and mobility uncertainty. IEEE Trans Syst Man Cyber Syst, 2016. doi: 10.1109\/TSMC.2016.2613600"},{"key":"9203_CR7","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2016.1600320CM","volume":"54","author":"Y Cao","year":"2016","unstructured":"Cao Y, Ye M, Geyong M, et al. Vehicular-publish\/subscribe (vp\/s) communication enabled on-the-move ev charging management. IEEE Commun Mag, 2016, 54: 84\u201392","journal-title":"IEEE Commun Mag"},{"key":"9203_CR8","doi-asserted-by":"crossref","first-page":"380","DOI":"10.3390\/electronics4030380","volume":"4","author":"E B Hamida","year":"2015","unstructured":"Hamida E B, Noura H, Znaidi W. Security of cooperative intelligent transport systems: standards, threats analysis and cryptographic countermeasures. Electronics, 2015, 4: 380\u2013423","journal-title":"Electronics"},{"key":"9203_CR9","volume-title":"Global Status Report on Road Safety 2015: Supporting A Decade of Action","author":"W H O Violence","year":"2015","unstructured":"Violence W H O, Prevention I, Organization W H. Global Status Report on Road Safety 2015: Supporting A Decade of Action. Geneva: World Health Organization, 2015"},{"key":"9203_CR10","volume-title":"Dissertation for Master\u2019s Degree","author":"M Khodaei","year":"2012","unstructured":"Khodaei M. Secure vehicular communication systems: design and implementation of a Vehicular PKI (VPKI). Dissertation for Master\u2019s Degree. Stockholm: Kungliga Tekniska H\u00f6gskolan, 2012"},{"key":"9203_CR11","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-3-540-77366-5_24","volume-title":"Proceedings of International Conference on Financial Cryptography and Data Security","author":"V Goyal","year":"2007","unstructured":"Goyal V. Certificate revocation using fine grained certificate space partitioning. In: Proceedings of International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2007. 247\u2013259"},{"key":"9203_CR12","first-page":"1406","volume-title":"Proceedings of the 19th Annual Joint Conference on IEEE Computer and Communications Societies, Tel Aviv","author":"P McDaniel","year":"2000","unstructured":"McDaniel P, Jamin S. Windowed certificate revocation. In: Proceedings of the 19th Annual Joint Conference on IEEE Computer and Communications Societies, Tel Aviv, 2000. 1406\u20131414"},{"key":"9203_CR13","first-page":"214","volume-title":"Proceedings of International Conference on Innovations in Information Technology (IIT), Abu Dhabi","author":"H A Falasi","year":"2011","unstructured":"Falasi H A, Barka E. Revocation in VANETS: a survey. In: Proceedings of International Conference on Innovations in Information Technology (IIT), Abu Dhabi, 2011. 214\u2013219"},{"key":"9203_CR14","first-page":"111","volume-title":"Proceedings of the ACM Workshops on Multimedia, Los Angeles","author":"P Wohlmacher","year":"2000","unstructured":"Wohlmacher P. Digital certificates: a survey of revocation methods. In: Proceedings of the ACM Workshops on Multimedia, Los Angeles, 2000. 111\u2013114"},{"key":"9203_CR15","first-page":"301","volume-title":"Proceedings of the 40th Annual Simulation Symposium, Washington","author":"M Fiore","year":"2007","unstructured":"Fiore M, Harri J, Filali F, et al. Vehicular mobility simulation for VANETS. In: Proceedings of the 40th Annual Simulation Symposium, Washington, 2007. 301\u2013309"},{"key":"9203_CR16","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MCOM.2009.4939288","volume":"47","author":"R A Uzcategui","year":"2009","unstructured":"Uzcategui R A, Sucre A J D, Acosta-Marum G. Wave: a tutorial. IEEE Commun Mag, 2009, 47: 126\u2013133","journal-title":"IEEE Commun Mag"},{"key":"9203_CR17","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","volume":"46","author":"H Hartenstein","year":"2008","unstructured":"Hartenstein H, Laberteaux L. A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag, 2008, 46: 164\u2013171","journal-title":"IEEE Commun Mag"},{"key":"9203_CR18","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.adhoc.2010.09.013","volume":"10","author":"M Amadeo","year":"2012","unstructured":"Amadeo M, Campolo C, Molinaro A. Enhancing IEEE 802.11 p\/wave to provide infotainment applications in VANETS. Ad Hoc Netw, 2012, 10: 253\u2013269","journal-title":"Ad Hoc Netw"},{"key":"9203_CR19","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/MCOM.2008.4689254","volume":"46","author":"E Schoch","year":"2008","unstructured":"Schoch E, Kargl F, Weber M. Communication patterns in VANETS. IEEE Commun Mag, 2008, 46: 119\u2013125","journal-title":"IEEE Commun Mag"},{"key":"9203_CR20","first-page":"1079","volume-title":"Proceedings of Global Communications Conference (GLOBECOM), Anaheim","author":"S Biswas","year":"2012","unstructured":"Biswas S, Mi\u0161i\u0107 J, Mi\u0161i\u0107 V. Ddos attack on wave-enabled vanet through synchronization. In: Proceedings of Global Communications Conference (GLOBECOM), Anaheim, 2012. 1079\u20131084"},{"key":"9203_CR21","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"J B Kenney","year":"2011","unstructured":"Kenney J B. Dedicated short-range communications (DSRC) standards in the united states. Proc IEEE, 2011, 99: 1162\u20131182","journal-title":"Proc IEEE"},{"key":"9203_CR22","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","volume":"50","author":"S Zeadally","year":"2012","unstructured":"Zeadally S, Hunt R, Chen Y S, et al. Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun Syst, 2012, 50: 217\u2013241","journal-title":"Telecommun Syst"},{"key":"9203_CR23","first-page":"2250","volume":"2","author":"T Sujitha","year":"2014","unstructured":"Sujitha T, Devi S P. Intelligent transportation system for vehicular ad-hoc networks. Int J Emerg Technol Adv Eng, 2014, 2: 2250\u20132459","journal-title":"Int J Emerg Technol Adv Eng"},{"key":"9203_CR24","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/978-1-84800-328-6_20","volume-title":"Guide to Wireless Ad Hoc Networks. Berlin: Springer","author":"Y Wang","year":"2009","unstructured":"Wang Y, Li F. Vehicular ad hoc networks. In: Guide to Wireless Ad Hoc Networks. Berlin: Springer, 2009. 503\u2013525"},{"key":"9203_CR25","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/WC-M.2006.250356","volume":"13","author":"D Jiang","year":"2006","unstructured":"Jiang D, Taliwal V, Meier A, et al. Design of 5.9 GHz dsrc-based vehicular safety communication. IEEE Wirel Commun, 2006, 13: 36\u201343","journal-title":"IEEE Wirel Commun"},{"key":"9203_CR26","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/MCOM.2010.5621980","volume":"48","author":"F Qu","year":"2010","unstructured":"Qu F, Wang F Y, Yang L. Intelligent transportation spaces: vehicles, traffic, communications, and beyond. IEEE Commun Mag, 2010, 48: 136\u2013142","journal-title":"IEEE Commun Mag"},{"key":"9203_CR27","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.trc.2014.05.006","volume":"46","author":"J Santa","year":"2014","unstructured":"Santa J, Pere\u02dcn\u00edguez F, Morag\u00f3n A, et al. Experimental evaluation of cam and denm messaging services in vehicular communications. Transp Res Part C Emerg Technol, 2014, 46: 98\u2013120","journal-title":"Transp Res Part C Emerg Technol"},{"key":"9203_CR28","doi-asserted-by":"crossref","first-page":"2827","DOI":"10.1016\/j.comcom.2007.12.003","volume":"31","author":"N W Wang","year":"2008","unstructured":"Wang N W, Huang Y M, Chen W M. A novel secure communication scheme in vehicular ad hoc networks. Comput Commun, 2008, 31: 2827\u20132837","journal-title":"Comput Commun"},{"key":"9203_CR29","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/MCOM.2013.6515060","volume":"51","author":"G Araniti","year":"2013","unstructured":"Araniti G, Campolo C, Condoluci M, et al. LTE for vehicular networking: a survey. IEEE Commun Mag, 2013, 51: 148\u2013157","journal-title":"IEEE Commun Mag"},{"key":"9203_CR30","first-page":"1","volume-title":"Proceedings of Embedded World Conference, Nuremberg","author":"T Sch\u00fctze","year":"2011","unstructured":"Sch\u00fctze T. Automotive security: cryptography for car2X communication. In: Proceedings of Embedded World Conference, Nuremberg, 2011. 1\u201316"},{"key":"9203_CR31","first-page":"25","volume-title":"Proceedings of the IEEE Intelligent Vehicles Symposium, Dearborn","author":"R Bishop","year":"2000","unstructured":"Bishop R. A survey of intelligent vehicle applications worldwide. In: Proceedings of the IEEE Intelligent Vehicles Symposium, Dearborn, 2000. 25\u201330"},{"key":"9203_CR32","first-page":"761","volume-title":"Proceedings of the 6th International Conference on ITS Telecommunications, Chengdu","author":"S Yousefi","year":"2006","unstructured":"Yousefi S, Mousavi M S, Fathy M. Vehicular ad hoc networks (VANETS): challenges and perspectives. In: Proceedings of the 6th International Conference on ITS Telecommunications, Chengdu, 2006. 761\u2013766"},{"key":"9203_CR33","doi-asserted-by":"crossref","first-page":"4004","DOI":"10.1109\/JSEN.2015.2410297","volume":"15","author":"Y Cao","year":"2015","unstructured":"Cao Y, Wang N, Sun Z, et al. A reliable and efficient encounter-based routing framework for delay\/disruption tolerant networks. IEEE Sensor J, 2015, 15: 4004\u20134018","journal-title":"IEEE Sensor J"},{"key":"9203_CR34","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MITP.2004.1265539","volume":"6","author":"J Blum","year":"2004","unstructured":"Blum J, Eskandarian A. The threat of intelligent collisions. IT Prof, 2004, 6: 24\u201329","journal-title":"IT Prof"},{"key":"9203_CR35","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1161064.1161083","volume-title":"Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks. Los Angeles","author":"P Kamat","year":"2006","unstructured":"Kamat P, Baliga A, Trappe W. An identity-based security framework for VANETS. In: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks. Los Angeles, 2006. 94\u201395"},{"key":"9203_CR36","first-page":"1","volume-title":"Proceedings of Workshop on Hot Topics in Networks (HotNets-IV) ACM, College Park","author":"B Parno","year":"2005","unstructured":"Parno B, Perrig A. Challenges in securing vehicular networks. In: Proceedings of Workshop on Hot Topics in Networks (HotNets-IV) ACM, College Park, 2005. 1\u20136"},{"key":"9203_CR37","volume-title":"Handbook of Reseach on Mobility and Computing","author":"J M Fuentes","year":"2010","unstructured":"Fuentes J M, Gonz\u00e1lez-Tablas A I, Ribagorda A. Overview of security issues in vehicular ad-hoc networks. In: Handbook of Reseach on Mobility and Computing. Hershey: IGI Globa, 2010"},{"key":"9203_CR38","first-page":"1","volume-title":"Proceedings of IEEE Globecom Workshops, New Orleans","author":"T Leinmuller","year":"2008","unstructured":"Leinmuller T, Schmidt R K, Schoch E, et al. Modeling roadside attacker behavior in VANETS. In: Proceedings of IEEE Globecom Workshops, New Orleans, 2008. 1\u201310"},{"key":"9203_CR39","first-page":"1","volume-title":"Proceedings of IEEE Global Telecommunications Conference, New Orleans","author":"Y Qian","year":"2008","unstructured":"Qian Y, Lu K, Moayeri N. A secure vanet mac protocol for dsrc applications. In: Proceedings of IEEE Global Telecommunications Conference, New Orleans, 2008. 1\u20135"},{"key":"9203_CR40","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.csi.2008.03.007","volume":"30","author":"K Pl\u00f6\u00dfl","year":"2008","unstructured":"Pl\u00f6\u00dfl K, Federrath H. A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Comput Stand Inter, 2008, 30: 390\u2013397","journal-title":"Comput Stand Inter"},{"key":"9203_CR41","first-page":"1","volume-title":"Proceedings of IEEE Military Communications Conference, Orlando","author":"J Sun","year":"2007","unstructured":"Sun J, Zhang C, Fang Y. An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: Proceedings of IEEE Military Communications Conference, Orlando, 2007. 1\u20137"},{"key":"9203_CR42","first-page":"1","volume-title":"Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Las Vegas","author":"J Choi","year":"2009","unstructured":"Choi J, Jung S. A security framework with strong non-repudiation and privacy in VANETS. In: Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Las Vegas, 2009. 1\u20135"},{"key":"9203_CR43","first-page":"58","volume":"4","author":"C Y Yeun","year":"2009","unstructured":"Yeun C Y, Al-Qutayri M, Al-Hawi F. Efficient security implementation for emerging VANETS. Ubiquit Comput Commun J, 2009, 4: 58\u201366","journal-title":"Ubiquit Comput Commun J"},{"key":"9203_CR44","volume-title":"Security of Self-Organizing Networks: MANET, WSN, WMN, VANET","author":"J Grover","year":"2016","unstructured":"Grover J, Gaur M, Laxmi V. Sybil attack in VANETS. In: Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Boca Raton: CRC Press, 2016"},{"key":"9203_CR45","first-page":"1","volume-title":"Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles","author":"B Xiao","year":"2006","unstructured":"Xiao B, Yu B, Gao C. Detection and localization of sybil nodes in VANETS. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, 2006. 1\u20138"},{"key":"9203_CR46","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.vehcom.2014.05.001","volume":"1","author":"M N Mejri","year":"2014","unstructured":"Mejri M N, Ben-Othman J, Hamdi M. Survey on vanet security challenges and possible cryptographic solutions. Veh Commun, 2014, 1: 53\u201366","journal-title":"Veh Commun"},{"key":"9203_CR47","volume-title":"Proceedings of the 5th Swiss Transport Research Conference (STRC)","author":"M Raya","year":"2005","unstructured":"Raya M, Hubaux J P. Security aspects of inter-vehicle communications. In: Proceedings of the 5th Swiss Transport Research Conference (STRC), Ascona, 2005"},{"key":"9203_CR48","volume-title":"An Implementation Guide","author":"M Anoop","year":"2007","unstructured":"Anoop M. Elliptic curve cryptography. An Implementation Guide, 2007"},{"key":"9203_CR49","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1145\/1741866.1741885","volume-title":"Proceedings of the 3rd ACM Conference on Wireless Network Security, Hoboken","author":"E Schoch","year":"2010","unstructured":"Schoch E, Kargl F. On the efficiency of secure beaconing in VANETS. In: Proceedings of the 3rd ACM Conference on Wireless Network Security, Hoboken, 2010. 111\u2013116"},{"key":"9203_CR50","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/WC-M.2006.250352","volume":"13","author":"M Raya","year":"2006","unstructured":"Raya M, Papadimitratos P, Hubaux J P. Securing vehicular communications. IEEE Wirel Commun, 2006, 13: 8\u201315","journal-title":"IEEE Wirel Commun"},{"key":"9203_CR51","volume-title":"Dissertation for Master\u2019s Degree","author":"C P Holguera","year":"2013","unstructured":"Holguera C P. Integral communication security analysis and pki design for intelligent transportation systems. Dissertation for Master\u2019s Degree. Bochum: RUHR University Bochum, 2013"},{"key":"9203_CR52","first-page":"270","volume":"35","author":"M E Zarki","year":"2002","unstructured":"Zarki M E, Mehrotra S, Tsudik G, et al. Security issues in a future vehicular network. Eur Wirel, 2002, 35: 270\u2013274","journal-title":"Eur Wirel"},{"key":"9203_CR53","first-page":"1","volume-title":"Proceedings of the 7th International Conference on ITS Telecommunications, Sophia Antipolis","author":"P Papadimitratos","year":"2007","unstructured":"Papadimitratos P, Buttyan L, Hubaux J P, et al. Architecture for secure and private vehicular communications. In: Proceedings of the 7th International Conference on ITS Telecommunications, Sophia Antipolis, 2007. 1\u20136"},{"key":"9203_CR54","first-page":"374","volume-title":"Proceedings of the 1st International Conference on Availability, Reliability and Security, Vienna","author":"K Plobi","year":"2006","unstructured":"Plobi K, Nowey T, Mletzko C. Towards a security architecture for vehicular ad hoc networks. In: Proceedings of the 1st International Conference on Availability, Reliability and Security, Vienna, 2006. 374\u2013381"},{"key":"9203_CR55","volume-title":"Proceedings of the 2nd International Workshop on Intelligent Transportation","author":"F Doetzer","year":"2005","unstructured":"Doetzer F, Kohlmayer F, Kosch T, at al. Secure communication for intersection assistance. In: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, 2005"},{"key":"9203_CR56","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1866855.1866862","volume-title":"Proceedings of the 6th ACM Workshop on Digital Identity Management, Chicago","author":"G D Crescenzo","year":"2010","unstructured":"Crescenzo G D, Zhang T. Efficient crl search in vehicular network PKIS. In: Proceedings of the 6th ACM Workshop on Digital Identity Management, Chicago, 2010. 17\u201326"},{"key":"9203_CR57","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MWC.2010.5601954","volume":"17","author":"A Wasef","year":"2010","unstructured":"Wasef A, Lu R, Lin X, et al. Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]. IEEE Wirel Commun, 2010, 17: 22\u201328","journal-title":"IEEE Wirel Commun"},{"key":"9203_CR58","volume-title":"Technical Report","author":"R Housley","year":"2002","unstructured":"Housley R, Polk W, Ford W, et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical Report. 2002"},{"key":"9203_CR59","first-page":"404","volume-title":"Proceedings of International Conference on Advances in Computing, Communications and Informatics, Jaipur","author":"A S Al-Hasan","year":"2016","unstructured":"Al-Hasan A S, Hossain M S, Atiquzzaman M. Security threats in vehicular ad hoc networks. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics, Jaipur, 2016. 404\u2013411"},{"key":"9203_CR60","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s12083-016-0431-x","volume":"10","author":"X Feng","year":"2017","unstructured":"Feng X, Li C Y, Chen D X, et al. A method for defensing against multi-source Sybil attacks in VANET. Peer Peer Netw Appl, 2017, 10: 305\u2013314","journal-title":"Peer Peer Netw Appl"},{"key":"9203_CR61","first-page":"1","volume-title":"Proceedings of International Conference on Networking Systems and Security, Dhaka","author":"N Islam","year":"2016","unstructured":"Islam N. Certificate revocation in vehicular ad hoc networks: a novel approach. In: Proceedings of International Conference on Networking Systems and Security, Dhaka, 2016. 1\u20135"},{"key":"9203_CR62","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1109\/JSAC.2007.071006","volume":"25","author":"M Raya","year":"2007","unstructured":"Raya M, Papadimitratos P, Aad I, et al. Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J Sel Area Commun, 2007, 25: 1557\u20131568","journal-title":"IEEE J Sel Area Commun"},{"key":"9203_CR63","volume-title":"Proceedings of the 4th Workshop on Vehicle-to-Vehicle Communications (V2VCOM2008)","author":"R K Schmidt","year":"2008","unstructured":"Schmidt R K, Leinm\u00fcller T, Schoch E, et al. Vehicle behavior analysis to enhance security in VANETS. In: Proceedings of the 4th Workshop on Vehicle-to-Vehicle Communications (V2VCOM2008), Istanbul, 2008"},{"key":"9203_CR64","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1023875.1023881","volume-title":"Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia","author":"P Golle","year":"2004","unstructured":"Golle P, Greene D, Staddon J. Detecting and correcting malicious data in VANETS. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, 2004. 29\u201337"},{"key":"9203_CR65","first-page":"1","volume-title":"Proceedings of IEEE Wireless Communications and Networking Conference, Budapest","author":"M Ghosh","year":"2009","unstructured":"Ghosh M, Varghese A, Kherani A A, et al. Distributed misbehavior detection in VANETS. In: Proceedings of IEEE Wireless Communications and Networking Conference, Budapest, 2009. 1\u20136"},{"key":"9203_CR66","volume-title":"Proceedings of International Conference on Dependable Systems and Networks","author":"S Bagchi","year":"2004","unstructured":"Bagchi S, Blough M, Santi P, et al. Diwans: workshop on dependability issues in wireless ad hoc networks and sensor networks. In: Proceedings of International Conference on Dependable Systems and Networks, Florence, 2004"},{"key":"9203_CR67","first-page":"16","volume":"13","author":"T Leinmuller","year":"2006","unstructured":"Leinmuller T, Schoch E, Kargl F. Position verification approaches for vehicular ad hoc networks. IEEEWirel Commun, 2006, 13: 16\u201321","journal-title":"IEEEWirel Commun"},{"key":"9203_CR68","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/11601494_9","volume-title":"Proceedings of European Workshop on Security in Ad-hoc and Sensor Networks","author":"T Leinm\u00fcller","year":"2005","unstructured":"Leinm\u00fcller T, Schoch E, Kargl F, et al. Influence of falsified position data on geographic ad-hoc routing. In: Proceedings of European Workshop on Security in Ad-hoc and Sensor Networks. Berlin: Springer, 2005. 102\u2013112"},{"key":"9203_CR69","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/1161064.1161075","volume-title":"Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles","author":"T Leinm\u00fcller","year":"2006","unstructured":"Leinm\u00fcller T, Maih\u00f6fer C, Schoch E, et al. Improved security in geographic ad hoc routing through autonomous position verification. In: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles, 2006. 57\u201366"},{"key":"9203_CR70","first-page":"1","volume-title":"Proceedings of Global Telecommunications Conference (GLOBECOM 2010), Miami","author":"Y Kondareddy","year":"2010","unstructured":"Kondareddy Y, Crescenzo G D, Agrawal P. Analysis of certificate revocation list distribution protocols for vehicular networks. In: Proceedings of Global Telecommunications Conference (GLOBECOM 2010), Miami, 2010. 1\u20135"},{"key":"9203_CR71","first-page":"778","volume-title":"Proceedings of Global Communications Conference (GLOBECOM), Atlanta","author":"M M Mahmoud","year":"2013","unstructured":"Mahmoud M M, Misic J, Shen X. Efficient public-key certificate revocation schemes for smart grid. In: Proceedings of Global Communications Conference (GLOBECOM), Atlanta, 2013. 778\u2013783"},{"key":"9203_CR72","first-page":"2521","volume-title":"Proceedings of the 65th Vehicular Technology Conference, Dublin","author":"M Gerlach","year":"2007","unstructured":"Gerlach M, Guttler F. Privacy in VANETS using changing pseudonyms-ideal and real. In: Proceedings of the 65th Vehicular Technology Conference, Dublin, 2007. 2521\u20132525"},{"key":"9203_CR73","first-page":"832","volume-title":"Proceedings of the 10th International Conference on Computer and Information Technology (CIT), Bradford","author":"A Tajeddine","year":"2010","unstructured":"Tajeddine A, Kayssi A, Chehab A. A privacy-preserving trust model for VANETS. In: Proceedings of the 10th International Conference on Computer and Information Technology (CIT), Bradford, 2010. 832\u2013837"},{"key":"9203_CR74","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/1287748.1287752","volume-title":"Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, Montreal","author":"G Calandriello","year":"2007","unstructured":"Calandriello G, Papadimitratos P, Hubaux J P, et al. Efficient and robust pseudonymous authentication in vanet. In: Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, Montreal, 2007. 19\u201328"},{"key":"9203_CR75","volume-title":"The Transport Layer Security (TLS) Protocol Version 1.2","author":"T Dierks","year":"2008","unstructured":"Dierks T. The Transport Layer Security (TLS) Protocol Version 1.2, 2008"},{"key":"9203_CR76","volume-title":"Hmac: Keyed-hashing for message authentication","author":"H Krawczyk","year":"1997","unstructured":"Krawczyk H, Canetti R, Bellare M. Hmac: Keyed-hashing for message authentication. 1997. https:\/\/docs.python.org\/ 2\/library\/hmac.html"},{"key":"9203_CR77","first-page":"393","volume-title":"Proceedings of the 4th International Conference on New Trends in Information Science and Service Science (NISS), Gyeongju","author":"G Samara","year":"2010","unstructured":"Samara G, Al-Salihy WA, Sures R. Security issues and challenges of vehicular ad hoc networks (VANET). In: Proceedings of the 4th International Conference on New Trends in Information Science and Service Science (NISS), Gyeongju, 2010. 393\u2013398"},{"key":"9203_CR78","first-page":"190","volume-title":"Proceedings of Symposium on Security and Privacy, Berkeley","author":"D A Cooper","year":"2000","unstructured":"Cooper D A. A more efficient use of delta-crls. In: Proceedings of Symposium on Security and Privacy, Berkeley, 2000. 190\u2013202"},{"key":"9203_CR79","volume-title":"Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences","author":"M Raya","year":"2006","unstructured":"Raya M, Jungels D, Papadimitratos P, et al. Certificate revocation in vehicular networks. Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland, 2006"},{"key":"9203_CR80","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/SECON.2010.5453881","volume-title":"Proceedings of the IEEE SoutheastCon 2010, Concord","author":"M E Nowatkowski","year":"2010","unstructured":"Nowatkowski M E, Owen H L. Certificate revocation list distribution in VANETS using most pieces broadcast. In: Proceedings of the IEEE SoutheastCon 2010, Concord, 2010. 238\u2013241"},{"key":"9203_CR81","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TIT.2006.874390","volume":"52","author":"A Shokrollahi","year":"2006","unstructured":"Shokrollahi A. Raptor codes. IEEE Trans Inf Theory, 2006, 52: 2551\u20132567","journal-title":"IEEE Trans Inf Theory"},{"key":"9203_CR82","first-page":"90","volume-title":"Proceedings of the 4th International Conference on Peer-to-Peer Computing, Zurich","author":"W Lin","year":"2004","unstructured":"Lin W, Chiu D M, Lee Y. Erasure code replication revisited. In: Proceedings of the 4th International Conference on Peer-to-Peer Computing, Zurich, 2004. 90\u201397"},{"key":"9203_CR83","first-page":"89","volume-title":"Proceedings of the 6th ACM International Workshop on VehiculAr Internetworking, Beijing","author":"J J Haas","year":"2009","unstructured":"Haas J J, Hu Y C, Laberteaux K P. Design and analysis of a lightweight certificate revocation mechanism for vanet. In: Proceedings of the 6th ACM International Workshop on VehiculAr Internetworking, Beijing, 2009. 89\u201398"},{"key":"9203_CR84","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/WAINA.2009.66","volume-title":"Proceedings of International Conference on Advanced Information Networking and Applications Workshops, Washington","author":"M Akhlaq","year":"2009","unstructured":"Akhlaq M, Aslam B, Alserhani F, et al. Empowered certification authority in VANETS. In: Proceedings of International Conference on Advanced Information Networking and Applications Workshops, Washington, 2009. 181\u2013186"},{"key":"9203_CR85","first-page":"86","volume-title":"Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, San Francisco","author":"P P Papadimitratos","year":"2008","unstructured":"Papadimitratos P P, Mezzour G, Hubaux J P. Certificate revocation list distribution in vehicular communication systems. In: Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, 2008. 86\u201387"},{"key":"9203_CR86","first-page":"88","volume-title":"Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, San Francisco","author":"K P Laberteaux","year":"2008","unstructured":"Laberteaux K P, Haas J J, Hu Y C. Security certificate revocation list distribution for vanet. In: Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, 2008. 88\u201389"},{"key":"9203_CR87","volume-title":"Dissertation for Master\u2019s Degree","author":"M Amoozadeh","year":"2012","unstructured":"Amoozadeh M. Certificate revocation list distribution in vehicular communication systems. Dissertation for Master\u2019s Degree. Stockholm: Kungliga Tekniska H\u00f6gskolan, 2012"},{"key":"9203_CR88","first-page":"88","volume":"46","author":"X Lin","year":"2008","unstructured":"Lin X, Lu R, Zhang C, et al. Security in vehicular ad hoc networks. IEEE Commun Mag, 2008, 46: 88\u201395","journal-title":"IEEE Commun Mag"},{"key":"9203_CR89","first-page":"1","volume-title":"Proceedings of IEEE Globecom Workshops, Washington","author":"K Papapanagiotou","year":"2007","unstructured":"Papapanagiotou K, Marias G F, Georgiadis P. A certificate validation protocol for VANETS. In: Proceedings of IEEE Globecom Workshops, Washington, 2007. 1\u20139"},{"key":"9203_CR90","first-page":"1","volume-title":"Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, Las Vegas","author":"K Papapanagiotou","year":"2006","unstructured":"Papapanagiotou K, Marias G, Georgiadis P, et al. Performance evaluation of a distributed ocsp protocol over manets. In: Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, Las Vegas, 2006. 1\u20135"},{"key":"9203_CR91","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/j.csi.2013.08.002","volume":"36","author":"C Ga\u02dcn\u00e1n","year":"2014","unstructured":"Ga\u02dcn\u00e1n C, Mu\u02dcnoz J L, Esparza O, et al. PPREM: privacy preserving revocation mechanism for vehicular ad hoc networks. Comput Stand Interface, 2014, 36: 513\u2013523","journal-title":"Comput Stand Interface"},{"key":"9203_CR92","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.pmcj.2014.01.002","volume":"21","author":"C Ga\u02dcn\u00e1n","year":"2015","unstructured":"Ga\u02dcn\u00e1n C, Munoz J L, Esparza O, et al. EPA: an efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervas Mobile Comput, 2015, 21: 75\u201391","journal-title":"Pervas Mobile Comput"},{"key":"9203_CR93","first-page":"1","volume-title":"Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome","author":"A Studer","year":"2009","unstructured":"Studer A, Shi E, Bai F, et al. Tacking together efficient authentication, revocation, and privacy in VANETS. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, 2009. 1\u20139"},{"key":"9203_CR94","first-page":"1","volume-title":"Proceedings of Vehicular Technology Conference (VTC Fall), San Francisco","author":"S Ruj","year":"2011","unstructured":"Ruj S, Cavenaghi M A, Huang Z, et al. On data-centric misbehavior detection in VANETS. In: Proceedings of Vehicular Technology Conference (VTC Fall), San Francisco, 2011. 1\u20135"},{"key":"9203_CR95","first-page":"123","volume-title":"Proceedings of the 6th ACM International Workshop on VehiculAr Inter NET working, Beijing","author":"M Ghosh","year":"2009","unstructured":"Ghosh M, Varghese A, Gupta A, et al. Misbehavior detection scheme with integrated root cause detection in vanet. In: Proceedings of the 6th ACM International Workshop on VehiculAr Inter NET working, Beijing, 2009. 123\u2013124"},{"key":"9203_CR96","doi-asserted-by":"crossref","first-page":"5214","DOI":"10.1109\/TVT.2009.2023662","volume":"58","author":"A Wasef","year":"2009","unstructured":"Wasef A, Shen X. Edr: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans Veh Technol, 2009, 58: 5214\u20135224","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9203-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-017-9203-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9203-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T20:24:30Z","timestamp":1659471870000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-017-9203-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,6]]},"references-count":96,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["9203"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9203-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,6]]},"article-number":"100301"}}