{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:32:32Z","timestamp":1758270752768},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T00:00:00Z","timestamp":1557100800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s12652-019-01304-3","type":"journal-article","created":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T16:36:04Z","timestamp":1557160564000},"page":"1669-1681","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An effective variant ring signature-based pseudonym changing mechanism for privacy preservation in mixed zones of vehicular networks"],"prefix":"10.1007","volume":"11","author":[{"given":"C.","family":"Kalaiarasy","sequence":"first","affiliation":[]},{"given":"N.","family":"Sreenath","sequence":"additional","affiliation":[]},{"given":"A.","family":"Amuthan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,6]]},"reference":[{"key":"1304_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.5121\/ijnsa.2018.10102","volume":"10","author":"B Amro","year":"2018","unstructured":"Amro B (2018) Protecting privacy in VANETs using mix zones with virtual pseudonym change. Int J Netw Secur Appl 10:11\u201321. \nhttps:\/\/doi.org\/10.5121\/ijnsa.2018.10102","journal-title":"Int J Netw Secur Appl"},{"key":"1304_CR2","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/cc.2017.7927579","volume":"14","author":"QA Arain","year":"2017","unstructured":"Arain QA, Deng Z, Memon I et al (2017) Privacy protection with dynamic pseudonym-based multiple mix-zones over road networks. China Commun 14:89\u2013100. \nhttps:\/\/doi.org\/10.1109\/cc.2017.7927579","journal-title":"China Commun"},{"key":"1304_CR3","doi-asserted-by":"publisher","unstructured":"Benin J, Poumailloux J, Owen H, Bouabdallah A (2012) Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks. In: Proceedings of the ninth ACM international workshop on vehicular inter-networking, systems, and applications\u2014VANET 12. \nhttps:\/\/doi.org\/10.1145\/2307888.2307912","DOI":"10.1145\/2307888.2307912"},{"key":"1304_CR4","doi-asserted-by":"publisher","unstructured":"Boeira F, Barcellos MP, Freitas EPD, et al (2017) Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning. In: 2017 IEEE Vehicular Networking Conference (VNC). \nhttps:\/\/doi.org\/10.1109\/vnc.2017.8275641","DOI":"10.1109\/vnc.2017.8275641"},{"key":"1304_CR5","doi-asserted-by":"publisher","unstructured":"Boualouache A, Moussaoui S (2014) S2SI: A practical pseudonym changing strategy for location privacy in VANETs. In: 2014 international conference on advanced networking distributed systems and applications. \nhttps:\/\/doi.org\/10.1109\/inds.2014.20","DOI":"10.1109\/inds.2014.20"},{"key":"1304_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1504\/ijahuc.2017.080914","volume":"24","author":"A Boualouache","year":"2017","unstructured":"Boualouache A, Moussaoui S (2017) Urban pseudonym changing strategy for location privacy in VANETs. Int J Ad Hoc Ubiquitous Comput 24:49. \nhttps:\/\/doi.org\/10.1504\/ijahuc.2017.080914","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"key":"1304_CR7","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.procs.2016.04.198","volume":"83","author":"A Boualouache","year":"2016","unstructured":"Boualouache A, Senouci S-M, Moussaoui S (2016) VLPZ: the vehicular location privacy zone. Procedia Comput Sci 83:369\u2013376. \nhttps:\/\/doi.org\/10.1016\/j.procs.2016.04.198","journal-title":"Procedia Comput Sci"},{"key":"1304_CR8","doi-asserted-by":"publisher","unstructured":"Buttyan L, Holczer T, Weimerskirch A, Whyte W (2009) SLOW: a practical pseudonym changing scheme for location privacy in VANETs. IEEE Vehic Netw Confer (VNC). \nhttps:\/\/doi.org\/10.1109\/vnc.2009.5416380","DOI":"10.1109\/vnc.2009.5416380"},{"key":"1304_CR9","doi-asserted-by":"publisher","unstructured":"Chowdhury M, Gawande A, Wang L (2017) Anonymous authentication and pseudonym-renewal for VANET in NDN. In: Proceedings of the 4th ACM conference on information-centric networking\u2014ICN 17. \nhttps:\/\/doi.org\/10.1145\/3125719.3132111","DOI":"10.1145\/3125719.3132111"},{"key":"1304_CR10","doi-asserted-by":"publisher","unstructured":"Forster D (2017) Decentralized enforcement of k-anonymity for location privacy using secret sharing. Verif Privacy Protect Veh Commun Syst. \nhttps:\/\/doi.org\/10.1007\/978-3-658-18550-3_5","DOI":"10.1007\/978-3-658-18550-3_5"},{"key":"1304_CR11","doi-asserted-by":"publisher","unstructured":"Forster D, Kargl F, Lohr H (2014) PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET). In: 2014 IEEE vehicular networking conference (VNC). \nhttps:\/\/doi.org\/10.1109\/vnc.2014.7013305","DOI":"10.1109\/vnc.2014.7013305"},{"key":"1304_CR12","doi-asserted-by":"publisher","first-page":"3400","DOI":"10.1109\/tits.2017.2775519","volume":"19","author":"D Forster","year":"2018","unstructured":"Forster D, Lohr H, Gratz A et al (2018) An evaluation of pseudonym changes for vehicular networks in large-scale, realistic traffic scenarios. IEEE Trans Intell Transp Syst 19:3400\u20133405. \nhttps:\/\/doi.org\/10.1109\/tits.2017.2775519","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1304_CR13","doi-asserted-by":"publisher","first-page":"16842","DOI":"10.1109\/access.2018.2800907","volume":"6","author":"N Guo","year":"2018","unstructured":"Guo N, Ma L, Gao T (2018) Independent mix zone for location privacy in vehicular networks. IEEE Access 6:16842\u201316850. \nhttps:\/\/doi.org\/10.1109\/access.2018.2800907","journal-title":"IEEE Access"},{"key":"1304_CR14","doi-asserted-by":"publisher","unstructured":"Javed MA, Khan JY (2013) A Cooperative Safety Zone Approach to Enhance the Performance of VANET Applications. 2013 IEEE 77th Vehicular Technology Conference (VTC Spring). \nhttps:\/\/doi.org\/10.1109\/vtcspring.2013.6691819","DOI":"10.1109\/vtcspring.2013.6691819"},{"key":"1304_CR15","doi-asserted-by":"publisher","unstructured":"Jemaa IB, Kaiser A, Lonc B (2017) Study of the impact of pseudonym change mechanisms on vehicular safety. In: 2017 IEEE vehicular networking conference (VNC). \nhttps:\/\/doi.org\/10.1109\/vnc.2017.8275632","DOI":"10.1109\/vnc.2017.8275632"},{"key":"1304_CR16","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.21275\/v5i3.nov162328","volume":"5","author":"S Joseph","year":"2016","unstructured":"Joseph S, Rajagopal R (2016) Efficient handoff based privacy preservation for VANET. Int J Sci Res (IJSR) 5:1703\u20131708. \nhttps:\/\/doi.org\/10.21275\/v5i3.nov162328","journal-title":"Int J Sci Res (IJSR)"},{"key":"1304_CR17","doi-asserted-by":"publisher","unstructured":"Liu Z, Liu Z, Zhang L, Lin X (2018) MARP: A distributed MAC layer attack resistant pseudonym scheme for VANET. In: IEEE transactions on dependable and secure computing, pp 1\u20131. \nhttps:\/\/doi.org\/10.1109\/tdsc.2018.2838136","DOI":"10.1109\/tdsc.2018.2838136"},{"key":"1304_CR18","doi-asserted-by":"publisher","unstructured":"Mano K, Minami K, Maruyama H (2013) Privacy-preserving publishing of pseudonym-based trajectory location data set. In: 2013 international conference on availability, reliability and security. \nhttps:\/\/doi.org\/10.1109\/ares.2013.81","DOI":"10.1109\/ares.2013.81"},{"key":"1304_CR19","doi-asserted-by":"publisher","first-page":"473151","DOI":"10.1155\/2014\/473151","volume":"10","author":"Y Mei","year":"2014","unstructured":"Mei Y, Jiang G, Zhang W, Cui Y (2014) A collaboratively hidden location privacy scheme for VANETs. Int J Distrib Sens Netw 10:473151. \nhttps:\/\/doi.org\/10.1155\/2014\/473151","journal-title":"Int J Distrib Sens Netw"},{"key":"1304_CR20","doi-asserted-by":"publisher","first-page":"24359","DOI":"10.1007\/s11042-016-4154-z","volume":"76","author":"I Memon","year":"2016","unstructured":"Memon I, Ali Q, Zubedi A, Mangi FA (2016) DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimedia Tools Appl 76:24359\u201324388. \nhttps:\/\/doi.org\/10.1007\/s11042-016-4154-z","journal-title":"Multimedia Tools Appl"},{"key":"1304_CR21","doi-asserted-by":"publisher","unstructured":"Palanisamy B, Liu L (2011) MobiMix: Protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th international conference on data engineering. \nhttps:\/\/doi.org\/10.1109\/icde.2011.5767898","DOI":"10.1109\/icde.2011.5767898"},{"key":"1304_CR22","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s12652-015-0309-4","volume":"7","author":"Y Park","year":"2015","unstructured":"Park Y, Sur C, Rhee K-H (2015) Pseudonymous authentication for secure V2I services in cloud-based vehicular networks. J Ambient Intell Hum Comput 7:661\u2013671. \nhttps:\/\/doi.org\/10.1007\/s12652-015-0309-4","journal-title":"J Ambient Intell Hum Comput"},{"key":"1304_CR23","doi-asserted-by":"publisher","unstructured":"Sureshkumar V, Amin R, Anitha R (2017) An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment. Int J Commun Syst. \nhttps:\/\/doi.org\/10.1002\/dac.3358","DOI":"10.1002\/dac.3358"},{"key":"1304_CR24","doi-asserted-by":"publisher","unstructured":"Wang D, Li D, Li X, Xiao Z (2015) An analysis of anonymity on capacity finite social spots based pseudonym changing for location privacy in VANETs. In: 12th international conference on fuzzy systems and knowledge discovery (FSKD). \nhttps:\/\/doi.org\/10.1109\/fskd.2015.7382038","DOI":"10.1109\/fskd.2015.7382038"},{"key":"1304_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s12652-015-0301-z","volume":"7","author":"C Wang","year":"2015","unstructured":"Wang C, Shi D, Xu X, Fang J (2015b) An anonymous data access scheme for VANET using pseudonym-based cryptography. J Ambient Intell Hum Comput 7:63\u201371. \nhttps:\/\/doi.org\/10.1007\/s12652-015-0301-z","journal-title":"J Ambient Intell Hum Comput"},{"key":"1304_CR26","doi-asserted-by":"publisher","unstructured":"Xu Z, Zhang H, Yu X (2016) Multiple mix-zones deployment for continuous location privacy protection. In: 2016 IEEE trustcom\/bigDataSE\/ISPA. \nhttps:\/\/doi.org\/10.1109\/trustcom.2016.0136","DOI":"10.1109\/trustcom.2016.0136"},{"key":"1304_CR27","doi-asserted-by":"publisher","unstructured":"Ying B, Makrakis D (2015) Reputation-based pseudonym change for location privacy in vehicular networks. In: 2015 IEEE international conference on communications (ICC). \nhttps:\/\/doi.org\/10.1109\/icc.2015.7249449","DOI":"10.1109\/icc.2015.7249449"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01304-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01304-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01304-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T23:29:19Z","timestamp":1588634959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01304-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,6]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1304"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01304-3","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,6]]},"assertion":[{"value":"7 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}