{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:47:10Z","timestamp":1730195230812,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/aiccsa.2010.5586996","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T19:54:29Z","timestamp":1285790069000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["A cluster based secure architecture for vehicular ad hoc networks"],"prefix":"10.1109","author":[{"given":"Tahani","family":"Gazdar","sequence":"first","affiliation":[]},{"given":"Abdelfettah","family":"Belghith","sequence":"additional","affiliation":[]},{"given":"Abderrahim","family":"Benslimane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2005.1520039"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428741"},{"key":"ref12","article-title":"Privacy Preserving Detection of Sybil Attacks in Vehicular Ad hoc Networks, Networking and Services archive","author":"zhou","year":"2006","journal-title":"2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems Networking & Services (MobiQuitous) MOBIQ"},{"key":"ref13","article-title":"CARAVAN: Providing Location Privacy for VANET","author":"sampigethaya","year":"2005","journal-title":"Proceedings of Embedded Security in Cars (ESCAR)"},{"key":"ref14","article-title":"A Secure and Resistant Architecture against Attacks for Mobile Ad Hoc Networks","author":"rachedi","year":"2008","journal-title":"Security and Communication Networks"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"ref16","article-title":"Towards an Effective Risk-conscious and Collaborative Vehicular Collision Avoidance System","author":"taleb","year":"2009","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/969164"},{"journal-title":"The Official PGP User's Guide","year":"1995","author":"zimmermann","key":"ref18"},{"key":"ref4","article-title":"Securing Vehicular Communications Assumptions, Requirements, and Principles","author":"papadimitratos","year":"2006","journal-title":"proceedings of the Workshop on Embedded Security in Cars (ESCAR'06)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250352"},{"key":"ref6","article-title":"Challenges in Securing Vehicular Networks","author":"parno","year":"2005","journal-title":"Workshop on Hot Topics in Networks (HotNets-IV)"},{"key":"ref5","article-title":"Secure Vehicle Communication","author":"leinmueller","year":"2006","journal-title":"IST-Mobile and Wireless Communications Summit"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.003"},{"key":"ref2","first-page":"299","article-title":"Authentic Vehicular Environment Using a Cluster Based Key Management","volume":"36","author":"sivagurunathan","year":"2009","journal-title":"European Journal of Scientific Research"},{"journal-title":"Efficient Secure Aggregation in VANETs VANET 06","year":"2006","author":"raya","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.1265539"}],"event":{"name":"2010 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2010,5,16]]},"location":"Hammamet, Tunisia","end":{"date-parts":[[2010,5,19]]}},"container-title":["ACS\/IEEE International Conference on Computer Systems and Applications - AICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5570122\/5586930\/05586996.pdf?arnumber=5586996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T05:06:24Z","timestamp":1489899984000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5586996\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2010.5586996","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}