{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:21:12Z","timestamp":1772644872666,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,3,8]],"date-time":"2012-03-08T00:00:00Z","timestamp":1331164800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s12083-012-0127-9","type":"journal-article","created":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T07:22:02Z","timestamp":1331104922000},"page":"215-228","source":"Crossref","is-referenced-by-count":28,"title":["An attack-and-defence game for security assessment in vehicular ad hoc networks"],"prefix":"10.1007","volume":"7","author":[{"given":"Suguo","family":"Du","sequence":"first","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Junbo","family":"Du","sequence":"additional","affiliation":[]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,8]]},"reference":[{"issue":"4","key":"127_CR1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.2008.4481346","volume":"46","author":"X Lin","year":"2008","unstructured":"Lin X, Lu R, Zhang C, Zhu H, Ho P-H, Shen X (2008) Security in vehicular Ad Hoc networks. IEEE Commun Mag 46(4):88\u201395","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"127_CR2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MWC.2009.5281251","volume":"16","author":"H Zhu","year":"2009","unstructured":"Zhu H, Lu R, Lin X, Shen X (2009) Security in service-oriented vehicular networks. IEEE Wirel Commun Mag 16(4):16\u201322","journal-title":"IEEE Wirel Commun Mag"},{"key":"127_CR3","doi-asserted-by":"crossref","unstructured":"Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM\u201911. Shanghai, China, 10\u201315 April 2011","DOI":"10.1109\/INFCOM.2011.5935026"},{"key":"127_CR4","doi-asserted-by":"crossref","unstructured":"Hsiao H, Studer A, Chen C, Perrig A, Bai F, Bellur B, Lyer A (2011) Flooding-resilient broadcast authentication for vanets. In: Proc. ACM MOBICOM\u201911","DOI":"10.1145\/2030613.2030635"},{"key":"127_CR5","doi-asserted-by":"crossref","unstructured":"Han Q, Du S, Ren D, Zhu H (2010) SAS: a secure data aggregation scheme in vehicular sensing networks. In: International Conference on Communications (IEEE ICC\u201910). Cape Town, South Africa, 23\u201327 May 2010","DOI":"10.1109\/ICC.2010.5502132"},{"key":"127_CR6","doi-asserted-by":"crossref","unstructured":"Reidt S, Srivatsa M, Balfe S (2009) The Fable of the bees: incentivizing robust revocation decision making in ad hoc networks. In: Proc. ACM CCS\u201909","DOI":"10.1145\/1653662.1653698"},{"key":"127_CR7","doi-asserted-by":"crossref","unstructured":"Raya M, Hubaux J-P (2007) Securing vehicular ad hoc networks. JCS-SASN","DOI":"10.3233\/JCS-2007-15103"},{"key":"127_CR8","unstructured":"Hoeper K, Gong G (2006) Bootstrapping security in mobile Ad Hoc networks using identity-based schemes with key revocation. Technical Report CACR 2006-04, Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada"},{"key":"127_CR9","doi-asserted-by":"crossref","unstructured":"Matt BJ (2004) Toward hierarchical identity-based cryptography for tactical networks. In: Proceedings of the 2004 Military Communications conference (MILCOM 2003), IEEE Computer Society, pp 727\u2013735","DOI":"10.1109\/MILCOM.2004.1494890"},{"key":"127_CR10","doi-asserted-by":"crossref","unstructured":"Zhang Y, Liu W, Lou W, Fang Y, Kwon Y (2005) AC-PKI: anonymous and certificateless public key infrastructure for mobile ad hoc networks. In: Proceedings of the International Conference on Communications (ICC 2005). IEEE Computer Society, pp 3515\u20133519","DOI":"10.1109\/ICC.2005.1495073"},{"issue":"4","key":"127_CR11","first-page":"311","volume":"2","author":"J Luo","year":"2005","unstructured":"Luo J, Hubaux J-P, Eugster PT (2005) DICTATE: distributed certification authority with probabilistic freshness for Ad Hoc networks. IEEE TDSC 2(4):311\u2013323","journal-title":"IEEE TDSC"},{"issue":"3","key":"127_CR12","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/1151374.1151381","volume":"40","author":"J Clulow","year":"2006","unstructured":"Clulow J, Moore T (2006) Suicide for the common good: a new strategy for credential revocation in self-organizing systems. ACM SIGOPS Operating Systems Review 40(3):18\u201321","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"127_CR13","unstructured":"Anderson R, Moore T, Clulow J, Nagaraja S (2007) New strategies for revocation in Ad-Hoc networks. In: Proceedings of the 4th European workshop on security and privacy in ad hoc and sensor networks (ESAS 2007). Springer, pp 232\u2013246"},{"key":"127_CR14","doi-asserted-by":"crossref","unstructured":"Moore T, Raya M, Clulow J, Papadimitratos P, Anderson R, Hubaux J-P (2008) Fast exclusion of errant devices from vehicular networks. In: Proceedings of the 5th conference on sensor, mesh and ad hoc communications and networks (SECON 2008), pp 135\u2013143","DOI":"10.1109\/SAHCN.2008.26"},{"key":"127_CR15","doi-asserted-by":"crossref","unstructured":"Raya M, Hossein Manshaei M, Felegyhazi M, Hubaux J-P (2008) Revocation games in ephemeral networks. In: Proceedings of the 15th ACM conference on computer and communications security. ACM, pp 199\u2013210","DOI":"10.1145\/1455770.1455797"},{"key":"127_CR16","doi-asserted-by":"crossref","unstructured":"Freudiger J, Manshaei M, Hubaux J-P, Parkes DC (2009) On non-cooperative location privacy: a game-theoretic analysis. CCS\u201909, 2009","DOI":"10.1145\/1653662.1653702"},{"issue":"1","key":"127_CR17","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford AR, Stajano F (2003) Location privacy in pervasive computing. Pervasive computing. IEEE 2(1):46\u201355","journal-title":"Pervasive computing. IEEE"},{"key":"127_CR18","first-page":"1","volume":"4691","author":"S Bistarelli","year":"2007","unstructured":"Bistarelli S, Dall\u2019Aglio M, Peretti P (2007) Strategic games on defense trees. FAST 4691:1\u201315","journal-title":"FAST"},{"key":"127_CR19","doi-asserted-by":"crossref","unstructured":"Ren D, Du S, Zhu H (2011) A novel attack tree based risk assessment approach for location privacy preservation in the VANETs. In: Proc. of ICC 2011","DOI":"10.1109\/icc.2011.5962947"},{"key":"127_CR20","first-page":"245","volume":"6442","author":"B Kordy","year":"2010","unstructured":"Kordy B, Mauw S, Melissen M, Schweitzer P (2010) Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. GameSec 6442:245\u2013256","journal-title":"GameSec"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-012-0127-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-012-0127-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-012-0127-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T01:30:47Z","timestamp":1561426247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-012-0127-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,8]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["127"],"URL":"https:\/\/doi.org\/10.1007\/s12083-012-0127-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,8]]}}}