{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:17:57Z","timestamp":1770272277350,"version":"3.49.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Scientific Research Deanship, University of Ha\u2019il, Saudi Arabia","award":["RG-23117"],"award-info":[{"award-number":["RG-23117"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3402336","type":"journal-article","created":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T17:48:59Z","timestamp":1715968139000},"page":"71232-71247","source":"Crossref","is-referenced-by-count":20,"title":["Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6367-0309","authenticated-orcid":false,"given":"Zeyad Ghaleb","family":"Al-Mekhlafi","sequence":"first","affiliation":[{"name":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Hail, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3597-4468","authenticated-orcid":false,"given":"Hussam Dheaa Kamel","family":"Al-Janabi","sequence":"additional","affiliation":[{"name":"Department of Computer Technical Engineering, Al-Mustafa University College, Baghdad, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5911-9642","authenticated-orcid":false,"given":"Ayman","family":"Khalil","sequence":"additional","affiliation":[{"name":"Adnan Kassar School, Lebanese American University, Beirut, Lebanon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2358-3785","authenticated-orcid":false,"given":"Mahmood A.","family":"Al-Shareeda","sequence":"additional","affiliation":[{"name":"Department of Communication Engineering, Iraq University College (IUC), Basrah, Iraq"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3539-4161","authenticated-orcid":false,"given":"Badiea Abdulkarem","family":"Mohammed","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Computer Science and Engineering, University of Ha&#x2019;il, Hail, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4228-7145","authenticated-orcid":false,"given":"Abeer Abdullah","family":"Alsadhan","sequence":"additional","affiliation":[{"name":"Computer Science Department, Applied College, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1075-1214","authenticated-orcid":false,"given":"Abdulaziz M.","family":"Alayba","sequence":"additional","affiliation":[{"name":"Department of Information and Computer Science, College of Computer Science and Engineering, University of Ha&#x2019;il, Hail, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2065-1217","authenticated-orcid":false,"given":"Ahmed M.","family":"Shamsan Saleh","sequence":"additional","affiliation":[{"name":"Department of Information Technology, University of Tabuk, Tabuk, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9850-6102","authenticated-orcid":false,"given":"Hamad A.","family":"Al-Reshidi","sequence":"additional","affiliation":[{"name":"Department of Instructional Technology, College of Education, University of Ha&#x2019;il, Hail, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8485-7268","authenticated-orcid":false,"given":"Khalil","family":"Almekhlafi","sequence":"additional","affiliation":[{"name":"CBA-Yanbu, Taibah University, Madinah, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","article-title":"An overview of VANET vehicular networks","author":"Hozouri","year":"2023","journal-title":"arXiv:2309.06555"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3198656"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12040872"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v21.i1.pp479-488"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.02.002"},{"key":"ref7","article-title":"Review of authentication communication protocols in mobile (vehicular) network via fog computing","author":"Ghalyan","year":"2024","journal-title":"Authorea Preprints"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.02.024"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3222488"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100458"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s22186934"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3019101"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100403"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3297527"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3159591"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100551"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2997694"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644428"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICOASE56293.2022.10075567"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2023923058"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3149714"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0881-0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2579162"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02039-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2966526"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.10.021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100414"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/15472450.2019.1625042"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3051435"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3064337"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3040876"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3104010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.07.001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3230442"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3157960"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3056712"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100200"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0689-3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2018.9010131"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109149"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2980297"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4660875"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.025"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1879-8"},{"key":"ref46","first-page":"99","article-title":"Generating hard instances of lattice problems","volume-title":"Proc. ACM Symp. Theory Comput.","author":"Ajtai"},{"issue":"97","key":"ref47","article-title":"The first and fourth public-key cryptosystems with worst-case\/average-case equivalence","volume-title":"Proc. Electron. Colloq. Comput. Complex. (ECCC)","volume":"14","author":"Ajtai"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_14"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107233"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8240"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81293-5_7"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24203"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10534149.pdf?arnumber=10534149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T17:26:19Z","timestamp":1716571579000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10534149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3402336","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}