{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:25:58Z","timestamp":1772933158112,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:00:00Z","timestamp":1620691200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:00:00Z","timestamp":1620691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772150"],"award-info":[{"award-number":["61772150"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762030"],"award-info":[{"award-number":["61762030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862012"],"award-info":[{"award-number":["61862012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962012"],"award-info":[{"award-number":["61962012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12083-021-01104-7","type":"journal-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T04:08:38Z","timestamp":1620706118000},"page":"2099-2114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing"],"prefix":"10.1007","volume":"14","author":[{"given":"Chunhai","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiaohuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,11]]},"reference":[{"key":"1104_CR1","doi-asserted-by":"crossref","unstructured":"Al-kahtani MS (2012) Survey on security attacks in vehicular ad hoc networks (vanets). In: 2012 6th international conference on signal processing and communication systems, pp 1\u20139","DOI":"10.1109\/ICSPCS.2012.6507953"},{"issue":"11","key":"1104_CR2","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1109\/TPDS.2012.47","volume":"23","author":"S Arif","year":"2012","unstructured":"Arif S, Olariu S, Wang J, Yan G, Yang W, Khalil I (2012) Datacenter at the airport: reasoning about time-dependent parking lot occupancy. IEEE Transactions on Parallel and Distributed Systems 23(11):2067\u20132080","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"4","key":"1104_CR3","first-page":"588","volume":"60","author":"MH Au","year":"2017","unstructured":"Au MH, Liu JK, Zhang Z, Susilo W, Li J, Zhou J (2017) Anonymous announcement system (aas) for electric vehicle in vanets. The Computer Journal 60(4):588\u2013599","journal-title":"The Computer Journal"},{"key":"1104_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X, Shacham H Franklin M (ed) (2004) Short group signatures. Springer, Berlin","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"1104_CR5","first-page":"147","volume-title":"Conditional privacy through ring signature in vehicular ad-hoc networks, vol 6750","author":"BK Chaurasia","year":"2011","unstructured":"Chaurasia BK, Verma S (2011) Conditional privacy through ring signature in vehicular ad-hoc networks, vol 6750. Springer, Berlin, pp 147\u2013156"},{"key":"1104_CR6","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek F, Rowstron A (eds) International workshop on peer-to-peer systems. Springer, Berlin, pp 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"key":"1104_CR7","doi-asserted-by":"crossref","unstructured":"Elsayed SA, Abdelhamid S, Hassanein HS (2018) Proactive caching at parked vehicles for social networking. In: 2018 IEEE International conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2018.8422388"},{"issue":"3","key":"1104_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.2478\/popets-2020-0046","volume":"2020","author":"V Fetzer","year":"2020","unstructured":"Fetzer V, Hoffmann M, Nagel M, Rupp A, Schwerdt R (2020) P4tcprovably-secure yet practical privacy-preserving toll collection. Proceedings on Privacy Enhancing Technologies 2020(3):62\u2013152. https:\/\/doi.org\/10.2478\/popets-2020-0046. https:\/\/content.sciendo.com\/view\/journals\/popets\/2020\/3\/article-p62.xml","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"12","key":"1104_CR9","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacypreserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inform Forensics Security 10 (12):2681\u20132691","journal-title":"IEEE Trans Inform Forensics Security"},{"issue":"2","key":"1104_CR10","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/TII.2014.2299233","volume":"10","author":"W He","year":"2014","unstructured":"He W, Yan G, Xu LD (2014) Developing vehicular data cloud services in the iot environment. IEEE Transactions on Industrial Informatics 10(2):1587\u20131595","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"1104_CR11","doi-asserted-by":"crossref","unstructured":"Kaur K, Garg S, Kaddoum G, Gagnon F, Ahmed SH (2019) Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In: 2019 IEEE International conference on communications workshops (ICC workshops), pp 1\u20136","DOI":"10.1109\/ICCW.2019.8757184"},{"issue":"15","key":"1104_CR12","doi-asserted-by":"publisher","first-page":"239","DOI":"10.14257\/ijfgcn.2015.8.6.23","volume":"8","author":"R Kaur","year":"2015","unstructured":"Kaur R, Kaur H (2015) Performance evaluation of routing protocols in VANET. International Journal of Future Generation Communication and Networking 8(15):239\u2013246. https:\/\/doi.org\/10.14257\/ijfgcn.2015.8.6.23","journal-title":"International Journal of Future Generation Communication and Networking"},{"issue":"6","key":"1104_CR13","first-page":"1441C1449","volume":"19","author":"CC Lee","year":"2013","unstructured":"Lee CC, Lai YM (2013) Toward a secure batch verification with group testing for vanet. Wireless Networks 19(6):1441C1449","journal-title":"Wireless Networks"},{"issue":"4","key":"1104_CR14","doi-asserted-by":"publisher","first-page":"6079","DOI":"10.1109\/JIOT.2018.2869892","volume":"6","author":"C Li","year":"2019","unstructured":"Li C, Wang S, Huang X, Li X, Yu R, Zhao F (2019) Parked vehicular computing for energy\u2013efficient internet of vehicles: a contract theoretic approach. IEEE Internet of Things Journal 6(4):6079\u20136088","journal-title":"IEEE Internet of Things Journal"},{"key":"1104_CR15","doi-asserted-by":"crossref","unstructured":"Li X, Liu H, Wei F, Ma J, Yang W (2015) A lightweight anonymous authentication protocol using k-pseudonym set in wireless networks. In: 2015 IEEE Global communications conference (GLOBECOM), pp 1\u20136","DOI":"10.1109\/GLOCOM.2015.7417584"},{"issue":"6","key":"1104_CR16","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin X, Sun X, Ho P, Shen X (2007) Gsis: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442\u20133456","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"1104_CR17","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10207-010-0109-y","volume":"9","author":"JK Liu","year":"2010","unstructured":"Liu JK, Baek J, Zhou J, Yang Y, Wong JW (2010) Efficient online\/offline identity-based signature for wireless sensor network. Int J Inf Secur 9(4):287\u2013296","journal-title":"Int J Inf Secur"},{"issue":"5","key":"1104_CR18","doi-asserted-by":"publisher","first-page":"5610","DOI":"10.1109\/TVT.2020.2982422","volume":"69","author":"S Maiti","year":"2020","unstructured":"Maiti S, Misra S (2020) P2b: privacy preserving identity-based broadcast proxy re-encryption. IEEE Trans Veh Technol 69(5):5610\u20135617","journal-title":"IEEE Trans Veh Technol"},{"key":"1104_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.vehcom.2017.02.001","volume":"9","author":"SS Manvi","year":"2017","unstructured":"Manvi SS, Tangade S (2017) A survey on authentication schemes in vanets for secured communication. Vehicular Communications 9:19\u201330. https:\/\/doi.org\/10.1016\/j.vehcom.2017.02.001. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214209616300018","journal-title":"Vehicular Communications"},{"key":"1104_CR20","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.vehcom.2018.01.008","volume":"12","author":"M Muhammad","year":"2018","unstructured":"Muhammad M, Safdar GA (2018) Survey on existing authentication issues for cellular-assisted v2x communication. Vehicular Communications 12:50\u201365. https:\/\/doi.org\/10.1016\/j.vehcom.2018.01.008. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214209617302267","journal-title":"Vehicular Communications"},{"issue":"1","key":"1104_CR21","first-page":"3968","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):3968","journal-title":"J Comput Secur"},{"key":"1104_CR22","doi-asserted-by":"crossref","unstructured":"Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: Boyd C (ed) Advances in cryptology-ASIACRYPT 2001. Springer, Berlin, p 552c565","DOI":"10.1007\/3-540-45682-1_32"},{"key":"1104_CR23","doi-asserted-by":"crossref","unstructured":"Safkhani M, Bagheri N, Peris-Lopez P, Mitrokotsa A, Hernandez-Castro JC (2012) Weaknesses in another gen2-based rfid authentication protocol. In: 2012 IEEE International conference on RFID-technologies and applications (RFID-TA), pp 80\u2013 84","DOI":"10.1109\/RFID-TA.2012.6404572"},{"issue":"3","key":"1104_CR24","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","volume":"65","author":"J Shao","year":"2016","unstructured":"Shao J, Lin X, Lu R, Zuo C (2016) A threshold anonymous authentication protocol for vanets. IEEE Trans Veh Technol 65(3):1711\u20131720","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"1104_CR25","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.dcan.2019.04.003","volume":"6","author":"R Shrestha","year":"2020","unstructured":"Shrestha R, Bajracharya R, Shrestha AP, Nam SY (2020) A new type of blockchain for secure message exchange in vanet. Digital Communications and Networks 6(2):177\u2013186. https:\/\/doi.org\/10.1016\/j.dcan.2019.04.003. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2352864818303092","journal-title":"Digital Communications and Networks"},{"issue":"1","key":"1104_CR26","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MWC.2017.1600195WC","volume":"24","author":"Z Su","year":"2017","unstructured":"Su Z, Hui Y, Yang Q (2017) The next generation vehicular networks: a content-centric framework. IEEE Wirel Commun 24(1):60\u201366","journal-title":"IEEE Wirel Commun"},{"issue":"7","key":"1104_CR27","doi-asserted-by":"publisher","first-page":"6461","DOI":"10.1109\/TVT.2016.2630300","volume":"66","author":"Z Su","year":"2017","unstructured":"Su Z, Xu Q, Hui Y, Wen M, Guo S (2017) A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks. IEEE Trans Veh Technol 66(7):6461\u20136474","journal-title":"IEEE Trans Veh Technol"},{"issue":"7","key":"1104_CR28","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIFS.2018.2885277","volume":"14","author":"Y Wang","year":"2019","unstructured":"Wang Y, Ding Y, Wu Q, Wei Y, Qin B, Wang H (2019) Privacy-preserving cloud-based road condition monitoring with source authentication in vanets. IEEE Transactions on Information Forensics and Security 14(7):1779\u20131790","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1104_CR29","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.vehcom.2018.11.001","volume":"15","author":"X Yang","year":"2019","unstructured":"Yang X, Yi X, Khalil I, Zeng Y, Huang X, Nepal S, Yang X, Cui H (2019) Alightweightauthenticationschemeforvehicularadhocnetworksbasedonmsr. VehicularCommunications 15:16\u201327. https:\/\/doi.org\/10.1016\/j.vehcom.2018.11.001.http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214209618301785","journal-title":"VehicularCommunications"},{"key":"1104_CR30","doi-asserted-by":"publisher","first-page":"1385C1391","DOI":"10.1016\/j.phpro.2012.02.206","volume":"24","author":"X Yi","year":"2012","unstructured":"Yi X, Wang L, Mao D, Zhan Y (2012) Angen2basedsecurityauthenticationprotocolforrfidsystem. PhysicsProcedia 24:1385C1391. https:\/\/doi.org\/10.1016\/j.phpro.2012.02.206.http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1875389212002490.International ConferenceonAppliedPhysicsandIndustrialEngineering2012","journal-title":"PhysicsProcedia"},{"issue":"8","key":"1104_CR31","first-page":"1851","volume":"17","author":"C Zhang","year":"2011","unstructured":"Zhang C, Ho PH, Tapolcai J (2011) Onbatchverificationwithgrouptestingforvehicularcommunications. WirelNetw 17(8):1851\u20131865","journal-title":"WirelNetw"},{"key":"1104_CR32","unstructured":"Zhang C, Lu R, Lin X, Ho P, Shen X (2008) Anefficientidentity-basedbatchverificationschemeforvehicularsensornetworks. In: IEEEINFOCOM2008-The27thconferenceoncomputercommunications,pp246\u2013250"},{"issue":"8","key":"1104_CR33","first-page":"2562","volume":"65","author":"L Zhang","year":"2016","unstructured":"Zhang L, Hu C, Wu Q, Domingo-Ferrer J, Qin B (2016) Privacy-preservingvehicularcommunicationauthenticationwithhierarchicalaggregationandfastresponse. IEEETransComput 65(8):2562\u20132574","journal-title":"IEEETransComput"},{"key":"1104_CR34","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2018.10.021","volume":"476","author":"H Zhong","year":"2019","unstructured":"Zhong H, Han S, Cui J, Zhang J, Xu Y (2019) Privacy-preservingauthenticationschemewithfullaggregationinvanet. InformationSciences 476:211\u2013221. https:\/\/doi.org\/10.1016\/j.ins.2018.10.021.http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025518308193","journal-title":"InformationSciences"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01104-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01104-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01104-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T11:25:22Z","timestamp":1624706722000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01104-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,11]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["1104"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01104-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,11]]},"assertion":[{"value":"6 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}