{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T04:20:26Z","timestamp":1777954826270,"version":"3.51.4"},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100002731","name":"Anqing Normal University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003995","name":"Anhui Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["2308085MF223"],"award-info":[{"award-number":["2308085MF223"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.adhoc.2026.104248","type":"journal-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T15:27:38Z","timestamp":1775575658000},"page":"104248","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A blockchain-enhanced cross-domain handover authentication scheme for Vehicular Ad-hoc Networks"],"prefix":"10.1016","volume":"189","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5674-5699","authenticated-orcid":false,"given":"Wenming","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yue","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Deyang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhuofei","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4392-3599","authenticated-orcid":false,"given":"Haiping","family":"Huang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.adhoc.2026.104248_b1","doi-asserted-by":"crossref","first-page":"3052","DOI":"10.1109\/TVT.2024.3481300","article-title":"Connectivity analysis for V2I communications in cognitive vehicular networks","volume":"74","author":"Li","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"10.1016\/j.adhoc.2026.104248_b2","doi-asserted-by":"crossref","first-page":"16219","DOI":"10.1109\/TVT.2025.3567603","article-title":"Authup: A privacy-preserving V2I authentication scheme for vehicular Ad Hoc networks","volume":"74","author":"Li","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"10.1016\/j.adhoc.2026.104248_b3","doi-asserted-by":"crossref","first-page":"15416","DOI":"10.1109\/TVT.2025.3570926","article-title":"Novel many-to-many NOMA-based communication protocols for vehicular platoons","volume":"74","author":"Bahbahani","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.adhoc.2026.104248_b4","doi-asserted-by":"crossref","first-page":"2127","DOI":"10.1109\/TVCG.2025.3644930","article-title":"Learning a domain-specialized network for light field spatial-angular super-resolution","volume":"32","author":"Mao","year":"2026","journal-title":"IEEE Trans. Vis. Comput. Graphics"},{"key":"10.1016\/j.adhoc.2026.104248_b5","doi-asserted-by":"crossref","first-page":"4839","DOI":"10.1109\/TCCN.2025.3641512","article-title":"An adaptive consistency-based detection scheme for label-flipping attacks in low-altitude economic networks","volume":"12","author":"Wang","year":"2026","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"10.1016\/j.adhoc.2026.104248_b6","first-page":"1","article-title":"Reasoning techniques meet graphrag: advancing LLM for wireless network cyber defense","author":"Tian","year":"2026","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"10.1016\/j.adhoc.2026.104248_b7","first-page":"5765","article-title":"Blockchain-based efficient access control with handover policy in iov-enabled intelligent transportation system","volume":"25","author":"Roy","year":"2024","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"8","key":"10.1016\/j.adhoc.2026.104248_b8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3656166","article-title":"And decentralized trust management in VANETs: A review of current research and future directions","volume":"56","author":"AlMarshoud","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"10.1016\/j.adhoc.2026.104248_b9","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.3390\/sym12061003","article-title":"HCDA: Efficient pairing-free homographic key management for dynamic cross-domain authentication in VANETs","volume":"12","author":"Cui","year":"2020","journal-title":"Symmetry"},{"issue":"3-4","key":"10.1016\/j.adhoc.2026.104248_b10","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1049\/ntw2.12036","article-title":"Privacy-preserving blockchain-based authentication and trust management in VANETs","volume":"11","author":"Ahmed","year":"2022","journal-title":"IET Netw."},{"issue":"12","key":"10.1016\/j.adhoc.2026.104248_b11","doi-asserted-by":"crossref","first-page":"15200","DOI":"10.1109\/TVT.2023.3289175","article-title":"Provable secure and lightweight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs","volume":"72","author":"Xie","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2026.104248_b12","doi-asserted-by":"crossref","unstructured":"V. Srinadh, B. Maram, T. Daniya, Data Security And Recovery Approach Using Elliptic Curve Cryptography, in: Proceedings of the IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2021, pp. 1\u20136.","DOI":"10.1109\/CSITSS54238.2021.9683473"},{"issue":"1","key":"10.1016\/j.adhoc.2026.104248_b13","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular Ad Hoc networks","volume":"15","author":"Raya","year":"2007","journal-title":"J. Comput. Secur."},{"issue":"12","key":"10.1016\/j.adhoc.2026.104248_b14","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.adhoc.2026.104248_b15","doi-asserted-by":"crossref","first-page":"3547","DOI":"10.1109\/JSYST.2020.2991168","article-title":"A lightweight privacy-preserving authentication protocol for VANETs","volume":"14","author":"Li","year":"2020","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.adhoc.2026.104248_b16","series-title":"Proceedings of the of the IEEE International Conference on Computing, Networking and Communications (ICNC)","first-page":"1","article-title":"Comments on a lightweight privacy preserving authentication protocol for VANETs","author":"Jan","year":"2024"},{"issue":"11","key":"10.1016\/j.adhoc.2026.104248_b17","doi-asserted-by":"crossref","first-page":"14978","DOI":"10.1109\/TVT.2023.3286187","article-title":"Lightweight and secure multi-factor authentication scheme in VANETs","volume":"72","author":"Tahir","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"10.1016\/j.adhoc.2026.104248_b18","doi-asserted-by":"crossref","first-page":"12250","DOI":"10.1109\/TVT.2022.3194008","article-title":"Secure and efficient blockchain-assisted authentication for edge-integrated internet-of-vehicles","volume":"71","author":"Shen","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2026.104248_b19","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1016\/j.future.2023.03.037","article-title":"A novel authentication and key agreement scheme for internet of vehicles","volume":"145","author":"Yang","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.adhoc.2026.104248_b20","first-page":"1","article-title":"A verifiable privacy-preserving cross-chain protocol for trusted vehicle edge computing","author":"Tang","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2026.104248_b21","doi-asserted-by":"crossref","first-page":"10203","DOI":"10.1109\/TIFS.2025.3607247","article-title":"Sightcvc: an efficient and compatible multi-chain transaction protocol in heterogeneous blockchain systems","volume":"20","author":"Yang","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"10.1016\/j.adhoc.2026.104248_b22","doi-asserted-by":"crossref","first-page":"7408","DOI":"10.1109\/TITS.2020.3002096","article-title":"BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks","volume":"22","author":"Lin","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.adhoc.2026.104248_b23","doi-asserted-by":"crossref","first-page":"6273","DOI":"10.1007\/s12652-021-03655-2","article-title":"Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks","volume":"14","author":"Gong","year":"2023","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"3","key":"10.1016\/j.adhoc.2026.104248_b24","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TNSE.2022.3142287","article-title":"Design of blockchain-based lightweight V2I handover authentication protocol for VANET","volume":"9","author":"Son","year":"2022","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"6","key":"10.1016\/j.adhoc.2026.104248_b25","first-page":"3491","article-title":"B-HAS: Blockchain-assisted efficient handover authentication and secure communication protocol in VANETs","volume":"10","author":"Dwivedi","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"10.1016\/j.adhoc.2026.104248_b26","article-title":"BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs","volume":"41","author":"Chen","year":"2023","journal-title":"Veh. Commun."},{"issue":"12","key":"10.1016\/j.adhoc.2026.104248_b27","doi-asserted-by":"crossref","first-page":"15200","DOI":"10.1109\/TVT.2023.3289175","article-title":"Provable secure and lightweight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs","volume":"72","author":"Xie","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2026.104248_b28","article-title":"DBCPCA: Double-layer blockchain-assisted conditional privacy-preserving cross-domain authentication for VANETs","volume":"162","author":"Chen","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.adhoc.2026.104248_b29","doi-asserted-by":"crossref","first-page":"72514","DOI":"10.1109\/ACCESS.2018.2881444","article-title":"Elliptic curve lightweight cryptography: A survey","volume":"6","author":"CA","year":"2018","journal-title":"IEEE Access"},{"issue":"16","key":"10.1016\/j.adhoc.2026.104248_b30","doi-asserted-by":"crossref","first-page":"33844","DOI":"10.1109\/JIOT.2025.3576313","article-title":"Cost-effective PUF and ECC-based authentication protocol for secure internet of drones communication","volume":"12","author":"Nyangaresi","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2026.104248_b31","first-page":"1","article-title":"A blockchain-enabled vaccine supply chain model driven by transfer learning-based sentiment analysis and demand forecasting","author":"Naeem","year":"2026","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.adhoc.2026.104248_b32","doi-asserted-by":"crossref","first-page":"4318","DOI":"10.1109\/TMC.2023.3288930","article-title":"A decentralized authenticated key agreement scheme based on smart contract for securing vehicular Ad-Hoc networks","volume":"23","author":"Wei","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104248_b33","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1109\/TVT.2024.3358784","article-title":"TileChain: A blockchain-based framework for security service management for vehicular communications","volume":"74","author":"Didouh","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2026.104248_b34","series-title":"Proceedings of the International Conference on Theory and Application of Cryptographic Techniques","first-page":"453","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"Canetti","year":"2001"},{"key":"10.1016\/j.adhoc.2026.104248_b35","doi-asserted-by":"crossref","unstructured":"T.T. Tran, T.T. Nguyen, D.C. Nguyen, V.H. Dinh, D.T. Mai, Blockchain-Integrated 5G Authentication: A ProVerif Formal Analysis Approach, in: Proceedings of the 2nd International Conference on Cryptography and Information Security (VCRIS), 2025, pp. 1\u20136.","DOI":"10.1109\/VCRIS68011.2025.11250574"},{"key":"10.1016\/j.adhoc.2026.104248_b36","doi-asserted-by":"crossref","unstructured":"T. Mieno, H. Okazaki, K. Arai, Y. Futa, H. Yamamoto, Formal Security Verification for Searchable Symmetric Encryption Using ProVerif, in: Proceedings of the International Symposium on Information Theory and Its Applications (ISITA), 2024, pp. 419\u2013424.","DOI":"10.23919\/ISITA60732.2024.10858210"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870526001149?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870526001149?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T19:47:12Z","timestamp":1777924032000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870526001149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":36,"alternative-id":["S1570870526001149"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2026.104248","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A blockchain-enhanced cross-domain handover authentication scheme for Vehicular Ad-hoc Networks","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2026.104248","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104248"}}