{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:32:00Z","timestamp":1778347920736,"version":"3.51.4"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Hubei Province College Provincial Level Education Research Project","award":["2018044"],"award-info":[{"award-number":["2018044"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3014038","type":"journal-article","created":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T21:21:38Z","timestamp":1596489698000},"page":"142858-142874","source":"Crossref","is-referenced-by-count":69,"title":["MFSPV: A Multi-Factor Secured and Lightweight Privacy-Preserving Authentication Scheme for VANETs"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9364-3678","authenticated-orcid":false,"given":"Saad Ali","family":"Alfadhli","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4489-2488","authenticated-orcid":false,"given":"Songfeng","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6030-0481","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2808-9943","authenticated-orcid":false,"given":"Meriem","family":"Sebai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"351","article-title":"On the security of a secure batch verification with group testing for VANET","volume":"16","author":"jianhong","year":"2014","journal-title":"Int J Netw Secur"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0543-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-011-0383-2"},{"key":"ref32","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2620999"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2294032"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.100313.120318"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.05.005"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295310"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref61","first-page":"119","article-title":"The scope of a logic of authentication","author":"burrows","year":"1989","journal-title":"Proc DIMACS Workshop Distrib Comput Cryptogr"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02039-x"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","article-title":"An identity-based security system for user privacy in vehicular ad hoc networks","volume":"21","author":"sun","year":"2010","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100228"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2164068"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919973"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2034669"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2009.5168976"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2904274"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986617"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5040-5_10"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937182"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2402166"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1047-x"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844548"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1604-0"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0629-8"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.024"},{"key":"ref10","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","author":"suh","year":"2007","journal-title":"Proc 44th ACM\/IEEE Design Autom Conf"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.10.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703088"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2300635"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2010.5529941"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583746"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2832201"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926578"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846299"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481346"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2016.7787005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3362125.3362128"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4752612"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2718101"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"ref9","first-page":"216","article-title":"Secure PUF: Physically unclonable function based on arbiter with enhanced resistance against machine learning (ML) attacks","author":"el-hajj","year":"2019","journal-title":"Proc 5th Int Conf Sensors Electron Instrum Adv (SEIA)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2502322"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0222-y"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717700899"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406877"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2517603"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0881-0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1710"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09154685.pdf?arnumber=9154685","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:56:44Z","timestamp":1642003004000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9154685\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3014038","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}