{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T17:13:28Z","timestamp":1772730808309,"version":"3.50.1"},"reference-count":42,"publisher":"Informa UK Limited","issue":"3","funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council of Taiwan","doi-asserted-by":"crossref","award":["[NSTC 114-2221-E-011-115-]"],"award-info":[{"award-number":["[NSTC 114-2221-E-011-115-]"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100020595","name":"National Science and Technology Council of Taiwan","doi-asserted-by":"crossref","award":["[NSTC 114-2221-E-011-122-]"],"award-info":[{"award-number":["[NSTC 114-2221-E-011-122-]"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100020595","name":"National Science and Technology Council of Taiwan","doi-asserted-by":"crossref","award":["[NSTC 114-2634-F-011-002-MBK-]"],"award-info":[{"award-number":["[NSTC 114-2634-F-011-002-MBK-]"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2026,3,4]]},"DOI":"10.1080\/17517575.2026.2628650","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:52:51Z","timestamp":1771231971000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing privacy in Internet of Vehicles through a streamlined certificateless ECC-based authentication protocol"],"prefix":"10.1080","volume":"20","author":[{"given":"Jheng-Jia","family":"Huang","sequence":"first","affiliation":[{"name":"National Taiwan University of Science and Technology","place":["Taipei, Taiwan"]}]},{"given":"Zheng-Yan","family":"Lin","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology","place":["Taipei, Taiwan"]}]},{"given":"Nai-Wei","family":"Lo","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology","place":["Taipei, Taiwan"]}]},{"given":"Chun-Huan","family":"Wang","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology","place":["Taipei, Taiwan"]}]}],"member":"301","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3050399"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3168512"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2015.0072"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634623"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2013.6717816"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2024.2421396"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3605066"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00033"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2466651"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech52372.2021.00109"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2718101"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.02.008"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.104"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.12.004"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102994"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008354106356"},{"key":"e_1_3_2_21_1","unstructured":"Levy S. 2015. Performance and Security of ECDSA. Berlin Germany: Comput. Sci."},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3246466"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890940"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2966526"},{"key":"e_1_3_2_26_1","first-page":"417","volume-title":"Advances in Cryptology \u2014CRYPTO \u201885 Proceedings","author":"Miller V.","year":"1985","unstructured":"Miller, V. 1985. \u201c\u201cUse of Elliptic Curves in Cryptography\u201d.\u201d Advances in Cryptology \u2014CRYPTO \u201885 Proceedings, 417\u2013426."},{"key":"e_1_3_2_27_1","unstructured":"Palatinus M. and P. Rusnak. 2014. Multi-Account Hierarchy for Deterministic Wallets. Accessed April 24 2014. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0044.mediawiki."},{"key":"e_1_3_2_28_1","unstructured":"Palatinus M. P. Rusnak A. Voisine and S. Bowe. 2013. Mnemonic code for generating deterministic keys. Accessed September 10 2013. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0039.mediawiki."},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-024-04752-8"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044961"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2051468"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100809"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3019304"},{"issue":"4","key":"e_1_3_2_36_1","first-page":"627","article-title":"A Novel Identity-Based Authentication Scheme for IoV Security","volume":"22","author":"Wang C.","year":"2020","unstructured":"Wang, C., Z. Dai, D. Zhao, and F. Wang. 2020. \u201cA Novel Identity-Based Authentication Scheme for IoV Security.\u201d International Journal of Network Security 22 (4): 627\u2013637.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3147595"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2023.2243616"},{"key":"e_1_3_2_39_1","unstructured":"Wuille P. 2012. Hierarchical Deterministic Wallets. Accessed February 11 2012. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0032.mediawiki."},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3116039"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.02.022"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3169948"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2017.1304578"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2026.2628650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:17:14Z","timestamp":1772727434000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2026.2628650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3,4]]}},"alternative-id":["10.1080\/17517575.2026.2628650"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2026.2628650","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,16]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-11-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-02-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-02-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2628650"}}