{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T20:41:55Z","timestamp":1757450515958,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T00:00:00Z","timestamp":1552348800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402095","61300196"],"award-info":[{"award-number":["61402095","61300196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s12652-019-01227-z","type":"journal-article","created":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T08:22:48Z","timestamp":1552378968000},"page":"1351-1359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A location privacy protection scheme based on random encryption period for VSNs"],"prefix":"10.1007","volume":"11","author":[{"given":"Xinyang","family":"Deng","sequence":"first","affiliation":[]},{"given":"Xin","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Tianhan","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,12]]},"reference":[{"issue":"1","key":"1227_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2(1):46\u201355. \nhttps:\/\/doi.org\/10.1109\/MPRV.2003.1186725","journal-title":"IEEE Pervasive Comput"},{"issue":"P2","key":"1227_CR2","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.adhoc.2015.05.016","volume":"36","author":"C Caballero-Gil","year":"2016","unstructured":"Caballero-Gil C, Molina-Gil J, Hern\u00e1ndez-Serrano J, Le\u00f3n O, Soriano-Iba\u00f1ez M (2016) Providing k-anonymity and revocation in ubiquitous vanets. Ad Hoc Netw 36(P2):482\u2013494","journal-title":"Ad Hoc Netw"},{"key":"1227_CR3","first-page":"585","volume":"3348","author":"X Chen","year":"2003","unstructured":"Chen X, Zhang F, Konidala DM, Kim K (2003) A new id-based group signature scheme from bilinear pairings. Cryptol Eprint Arch Rep 3348:585\u2013592","journal-title":"Cryptol Eprint Arch Rep"},{"issue":"3","key":"1227_CR4","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10707-010-0117-0","volume":"15","author":"CY Chow","year":"2010","unstructured":"Chow CY, Mokbel MF, Bao J, Liu X (2010) Query-aware location anonymization for road networks. GeoInformatica 15(3):571\u2013607. \nhttps:\/\/doi.org\/10.1007\/s10707-010-0117-0","journal-title":"GeoInformatica"},{"issue":"3","key":"1227_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s12652-015-0268-9","volume":"6","author":"EA Feukeu","year":"2015","unstructured":"Feukeu EA, Djouani K, Kurien A (2015) Performance evaluation of the adsa in a vehicular network: Mac approach in IEEE 802.11p. J Ambient Intell Humaniz Comput 6(3):351\u2013360. \nhttps:\/\/doi.org\/10.1007\/s12652-015-0268-9","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1227_CR01","unstructured":"Freudiger J, Raya M, F\u00e9legyh\u00e1zi M, Papadimitratos P, Hubaux J (2007) Mix-zones for location privacy in vehicular networks. In: ACM workshop on wireless networking for intelligent transportation systems (WiN-ITS)"},{"issue":"9","key":"1227_CR6","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","volume":"11","author":"D He","year":"2016","unstructured":"He D, Zeadally S, Kumar N, Wu W (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf Forensics Secur 11(9):2052\u20132064. \nhttps:\/\/doi.org\/10.1109\/TIFS.2016.2573746","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"1227_CR7","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TITS.2011.2156790","volume":"12","author":"D Huang","year":"2011","unstructured":"Huang D, Misra S, Verma M, Xue G (2011) Pacp: an efficient pseudonymous authentication-based conditional privacy protocol for vanets. IEEE Trans Intell Transp Syst 12(3):736\u2013746. \nhttps:\/\/doi.org\/10.1109\/TITS.2011.2156790","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"7","key":"1227_CR8","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"JB Kenney","year":"2011","unstructured":"Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the united states. Proc IEEE 99(7):1162\u20131182. \nhttps:\/\/doi.org\/10.1109\/JPROC.2011.2132790","journal-title":"Proc IEEE"},{"issue":"3","key":"1227_CR9","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s12652-016-0442-8","volume":"9","author":"HK Kong","year":"2018","unstructured":"Kong HK, Hong MK, Kim TS (2018) Security risk assessment framework for smart car using the attack tree analysis. J Ambient Intell Humaniz Comput 9(3):531\u2013551. \nhttps:\/\/doi.org\/10.1007\/s12652-016-0442-8","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"1227_CR10","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R Lu","year":"2012","unstructured":"Lu R, Li X, Luan TH, Liang X, Shen X (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans Veh Technol 61(1):86\u201396. \nhttps:\/\/doi.org\/10.1109\/TVT.2011.2162864","journal-title":"IEEE Trans Veh Technol"},{"key":"1227_CR11","doi-asserted-by":"publisher","unstructured":"Palanisamy B, Liu L (2011) Mobimix: protecting location privacy with mix-zones over road networks. In: IEEE international conference on data engineering. \nhttps:\/\/doi.org\/10.1109\/ICDE.2011.5767898","DOI":"10.1109\/ICDE.2011.5767898"},{"issue":"4","key":"1227_CR12","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s12652-012-0115-1","volume":"5","author":"K Paridel","year":"2014","unstructured":"Paridel K, Mantadelis T, Yasar AUH, Preuveneers D, Janssens G, Vanrompay Y, Berbers Y (2014) Analyzing the efficiency of context-based grouping on collaboration in vanets with large-scale simulation. J Ambient Intell Humaniz Comput 5(4):475\u2013490. \nhttps:\/\/doi.org\/10.1007\/s12652-012-0115-1","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1227_CR13","doi-asserted-by":"publisher","unstructured":"Smaldone S, Lu H, Shankar P, Iftode L (2008) RoadSpeak: enabling voice chat on roadways using vehicular social networks. \nhttps:\/\/doi.org\/10.1145\/1435497.1435505","DOI":"10.1145\/1435497.1435505"},{"key":"1227_CR14","unstructured":"Solanas A, Mart\u00ednezballest\u00e9 A (2007) Privacy protection in location-based services through a public-key privacy homomorphism. In: European conference on public key infrastructure: theory and practice"},{"issue":"1","key":"1227_CR15","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/s11036-009-0175-4","volume":"15","author":"A Wasef","year":"2010","unstructured":"Wasef A, Shen X (2010) Rep: location privacy for vanets using random encryption periods. Mobile Netw Appl 15(1):172\u2013185. \nhttps:\/\/doi.org\/10.1007\/s11036-009-0175-4","journal-title":"Mobile Netw Appl"},{"key":"1227_CR16","doi-asserted-by":"publisher","unstructured":"Wiedersheim B, Ma Z, Kargl F, Papadimitratos P (2010) Privacy in inter-vehicular networks: why simple pseudonym change is not enough. In: 2010 Seventh international conference on wireless on-demand network systems and services (WONS), pp 176\u2013183. \nhttps:\/\/doi.org\/10.1109\/WONS.2010.5437115","DOI":"10.1109\/WONS.2010.5437115"},{"issue":"8","key":"1227_CR17","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/LCOMM.2013.070113.122816","volume":"17","author":"B Ying","year":"2013","unstructured":"Ying B, Makrakis D, Mouftah HT (2013) Dynamic mix-zone for location privacy in vehicular networks. IEEE Commun Lett 17(8):1524\u20131527. \nhttps:\/\/doi.org\/10.1109\/LCOMM.2013.070113.122816","journal-title":"IEEE Commun Lett"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01227-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01227-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01227-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T20:20:58Z","timestamp":1583871658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01227-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,12]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["1227"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01227-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2019,3,12]]},"assertion":[{"value":"25 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}