{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:12:46Z","timestamp":1761743566753,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/apnoms.2011.6077002","type":"proceedings-article","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T21:14:09Z","timestamp":1321564449000},"page":"1-8","source":"Crossref","is-referenced-by-count":14,"title":["Beacon-based trust management for location privacy enhancement VANETs"],"prefix":"10.1109","author":[{"given":"Yu-Chih","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yi-Ming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hwai-Ling","family":"Shan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312647"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2010.033823"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.009"},{"journal-title":"Information technology - Security techniques - Key management - Part 3 Mechanisms using asymmetric technologies - Second Edition","year":"2008","key":"ref32"},{"journal-title":"Flexible Extensible and Efficient VANET Authentication","year":"2010","author":"ahren","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601954"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2009.22"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.123"},{"key":"ref35","article-title":"Query Recommendation for Improving Search Engine Results","author":"zahera","year":"2010","journal-title":"World Congress on Engineering and Computer Science (WCECS)"},{"journal-title":"DOT HS 809 859","article-title":"Vehicle Safety Communications Project Task 3 Final Report: Identify intelligent vehicle safety applications enabled by DSRC","year":"2005","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","article-title":"An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks","volume":"21","author":"sun","year":"2010","journal-title":"Parallel and Distributed Systems IEEE Transactions on"},{"key":"ref11","article-title":"Mix-Zones for Location Privacy in Vehicular Networks","author":"freudiger","year":"2007","journal-title":"Proceedings of the First International Workshop on Wireless Networking for Intelligent Transportation Systems (Win-ITS)"},{"key":"ref12","first-page":"1","article-title":"SafeAnon: a safe location privacy scheme for vehicular networks","author":"chen","year":"2010","journal-title":"Telecommunication Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161075"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250353"},{"key":"ref15","article-title":"Vehicle Behavior Analysis to Enhance Security in VANETs","author":"schmidt","year":"2008","journal-title":"Proceedings of 4th Workshop on Vehicle to Vehicle Communications (V2VCOM 2008)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2009.4917675"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.02.008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621979"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2009.5384696"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"journal-title":"IEEE trial-use standard for wireless access in vehicular environments - security services for applications and management messages","year":"2006","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.519"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2008.33"},{"key":"ref29","first-page":"2","article-title":"The TESLA broadcast authentication protocol","volume":"5","author":"perrig","year":"2002","journal-title":"RSA CryptoBytes"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"journal-title":"A Customizable k-Anonymity Model for Protecting Location Privacy","year":"2004","author":"gedik","key":"ref7"},{"key":"ref2","first-page":"197","author":"d\u00f6tzer","year":"2006","journal-title":"Privacy Issues in Vehicular Ad Hoc Networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1514411.1514413"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"Journal of Computer Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2005.109"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TVT.2009.2034669","article-title":"Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications","volume":"59","author":"wu","year":"2010","journal-title":"Vehicular Technology IEEE Transactions on"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.79"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/11964254_6","article-title":"Impact of Pseudonym Changes on Geographic Routing in VANETs","volume":"4357","author":"schoch","year":"2006","journal-title":"Security and Privacy in Ad-hoc and Sensor Networks"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.013"}],"event":{"name":"2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2011,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,9,23]]}},"container-title":["2011 13th Asia-Pacific Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6069626\/6076947\/06077002.pdf?arnumber=6077002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T19:13:11Z","timestamp":1560971591000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6077002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/apnoms.2011.6077002","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}