{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T19:53:56Z","timestamp":1649015636516},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,6,26]],"date-time":"2012-06-26T00:00:00Z","timestamp":1340668800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s12083-012-0143-9","type":"journal-article","created":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T13:13:08Z","timestamp":1340629988000},"page":"285-294","source":"Crossref","is-referenced-by-count":2,"title":["Identity privacy-based reliable routing method in VANETs"],"prefix":"10.1007","volume":"7","author":[{"given":"Di","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiaojing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Dongxia","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,26]]},"reference":[{"key":"143_CR1","doi-asserted-by":"crossref","unstructured":"Zhang C, Lin X, Lu R, Ho P-H (2008) RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. The IEEE International Conference on Computer Communications, pp 1451\u20131457","DOI":"10.1109\/ICC.2008.281"},{"key":"143_CR2","unstructured":"Dedicated Short Range Communications (DSRC), [Online]. Available: http:\/\/grouper.ieee.org\/groups\/scc32\/dsrc\/index.html"},{"key":"143_CR3","doi-asserted-by":"crossref","unstructured":"Zhang L, Wu Q, Solanas A, Domingo-Ferrer J (2010) A scalable robust authentication protocol for secure vehicular communications. IEEE Transactions on Vehicular Technology, pp 1606\u20131617","DOI":"10.1109\/TVT.2009.2038222"},{"key":"143_CR4","doi-asserted-by":"crossref","unstructured":"Sun X, Lin X, Ho P-H (2007) Secure vehicular communications based on group signature and ID-based signature scheme. The IEEE International Conference on Computer Communications, pp 1539\u20131545","DOI":"10.1109\/ICC.2007.258"},{"key":"143_CR5","doi-asserted-by":"crossref","unstructured":"Lee S, Pan G, Park J, Gerla M, Lu S (2007) Secure incentives for commercial ad dissemination in vehicular networks. In Processings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc\u201907), Montreal, Canada","DOI":"10.1145\/1288107.1288128"},{"key":"143_CR6","doi-asserted-by":"crossref","unstructured":"Yan G, Olariu S (2009) An efficient geographic location-based security mechanism for vehicular adhoc networks. IEEE 6th International Conference on Mobile Ad hoc and Sensor Systems(MASS), pp 804\u2013809","DOI":"10.1109\/MOBHOC.2009.5336914"},{"key":"143_CR7","doi-asserted-by":"crossref","unstructured":"Sun J, Zhang C, Zhang Y, Fang Y (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, pp 1227\u20131239","DOI":"10.1109\/TPDS.2010.14"},{"key":"143_CR8","first-page":"1229","volume":"2008","author":"R Lu","year":"2008","unstructured":"Lu R, Lin X, Zhu H, Ho P-H, Shen X (2008) ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. INFOCOM 2008:1229\u20131237","journal-title":"INFOCOM"},{"key":"143_CR9","doi-asserted-by":"crossref","unstructured":"Schoch E, Kargl F, Weber M, Leinmuller T (2008) Communication patterns in VANETs. Communications Magazine, IEEE, pp 119\u2013125","DOI":"10.1109\/MCOM.2008.4689254"},{"issue":"3","key":"143_CR10","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"2","author":"JP Hubaux","year":"2004","unstructured":"Hubaux JP, Capkun S, Luo J (2004) The security and privacy of smart vehicles. IEEE Secur Priv Mag 2(3):49\u201355","journal-title":"IEEE Secur Priv Mag"},{"issue":"1","key":"143_CR11","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39\u201368","journal-title":"J Comput Secur"},{"issue":"6","key":"143_CR12","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin X, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Tech 56(6):3442\u20133456","journal-title":"IEEE Trans Veh Tech"},{"key":"143_CR13","doi-asserted-by":"crossref","DOI":"10.1109\/INFOCOM.2008.58","volume-title":"An efficient identity based batch verification scheme for vehicular sensor networks","author":"C Zhang","year":"2008","unstructured":"Zhang C, Lu R, Lin X, Ho P-H, Shen X (2008) An efficient identity based batch verification scheme for vehicular sensor networks. IEEE International Conference on Computer Communications (INFOCOM\u201908), Phoenix"},{"key":"143_CR14","doi-asserted-by":"crossref","unstructured":"Park K-J, Hou J, Basar T, Kim H (2009) Noncooperative carrier sense game in wireless networks. IEEE Transactions on Wireless Communications, pp 5280\u20135289","DOI":"10.1109\/TWC.2009.081582"},{"key":"143_CR15","doi-asserted-by":"crossref","unstructured":"Poongothai T, Jayarajan K (2008) A noncooperative game approach for intrusion detection in Mobile Adhoc networks. International Conference on Computing, Communication and Networking, pp 1\u20134","DOI":"10.1109\/ICCCNET.2008.4787668"},{"key":"143_CR16","doi-asserted-by":"crossref","unstructured":"Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs, INFOCOM, pp 2147\u20132155","DOI":"10.1109\/INFCOM.2011.5935026"},{"issue":"12","key":"143_CR17","doi-asserted-by":"crossref","first-page":"4987","DOI":"10.1109\/T-WC.2008.070773","volume":"7","author":"X Lin","year":"2008","unstructured":"Lin X, Sun X, Wang X, Zhang C, Ho P-H, Shen X (2008) TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans Wireless Comm 7(12):4987\u20134998","journal-title":"IEEE Trans Wireless Comm"},{"key":"143_CR18","doi-asserted-by":"crossref","unstructured":"Bennis M, Lara J, Tolli A (2008) Non-cooperative operators in a game-theoretic framework. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp 1\u20135","DOI":"10.1109\/PIMRC.2008.4699791"},{"key":"143_CR19","doi-asserted-by":"crossref","unstructured":"Pavlidou F-N, Koltsidas G (2008) Game theory for routing modeling in communication networks\u2014a survey. J Commun Netw 10(3)","DOI":"10.1109\/JCN.2008.6388348"},{"key":"143_CR20","doi-asserted-by":"crossref","unstructured":"Naserian M, Tepe K (2009) Game theoretic approach in routing protocol for wireless ad hoc networks. M. Naserian, K. Tepe\/Ad Hoc Networks 7 (2009) 569\u2013578","DOI":"10.1016\/j.adhoc.2008.07.003"},{"key":"143_CR21","doi-asserted-by":"crossref","unstructured":"Altman E, El Azouzi R, Abramov V (2002) Non-cooperative routing in loss networks. In: Altman E et al. Performance Evaluation 49:257\u2013272","DOI":"10.1016\/S0166-5316(02)00112-8"},{"issue":"5","key":"143_CR22","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inform Theor 22(5):644\u2013654","journal-title":"IEEE Trans Inform Theor"},{"issue":"9","key":"143_CR23","doi-asserted-by":"crossref","first-page":"2586","DOI":"10.1109\/TWC.2006.1687783","volume":"5","author":"J-S Hwu","year":"2006","unstructured":"Hwu J-S, Chen R-J, Lin Y-B (2006) An efficient identity-based cryptosystem for end-to-end mobile security. IEEE Trans Wireless Comm 5(9):2586\u20132593","journal-title":"IEEE Trans Wireless Comm"},{"key":"143_CR24","doi-asserted-by":"crossref","unstructured":"Zhu H, Chang S, Li M, Naik K, Shen S (2011) Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks. INFOCOM, pp 2192\u20132200","DOI":"10.1109\/INFCOM.2011.5935032"},{"key":"143_CR25","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy preserving packet forwarding protocol for vehicular delay tolerant networks. In Proceedings of IEEE INFOCOM","DOI":"10.1109\/INFCOM.2010.5462161"},{"key":"143_CR26","unstructured":"Keranen A, Ott J (2007) Increasing reality for DTN protocol simulations. Technical Report, Helsinki University of Technology, Networking Laboratory (July 2007)"},{"key":"143_CR27","unstructured":"ONE simulator. http:\/\/www.netlab.tkk.fi\/tutkimus\/dtn\/theone\/"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-012-0143-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-012-0143-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-012-0143-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T07:47:50Z","timestamp":1561880870000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-012-0143-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,26]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["143"],"URL":"https:\/\/doi.org\/10.1007\/s12083-012-0143-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,26]]}}}