{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:22:53Z","timestamp":1729653773717,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1109\/ccnc.2010.5421785","type":"proceedings-article","created":{"date-parts":[[2010,3,2]],"date-time":"2010-03-02T14:38:06Z","timestamp":1267540686000},"page":"1-2","source":"Crossref","is-referenced-by-count":3,"title":["Anonymous Group Implicit Certificate Scheme"],"prefix":"10.1109","author":[{"given":"Nader M.","family":"Rabadi","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"2005","journal-title":"Vehicle Safety Communications Project Task 3 Final Report Identify Intelligent Vehicle Safety Applications Enabled by DSRC","article-title":"National Highway Traffic Safety Administration","key":"ref4"},{"year":"0","journal-title":"Intelligent Transportation Systems","key":"ref3"},{"key":"ref10","article-title":"Group signatures: better efficiency and new theoretical aspects","volume":"3352","author":"camenisch","year":"2005","journal-title":"4th Int Conf on Security in Communication Networks SCN 2004 Lecture Notes in Computer Science"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"year":"0","key":"ref11"},{"key":"ref5","first-page":"39","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"Journal of Computer Security special Issue on Security of Ad Hoc and Sensor Networks"},{"key":"ref12","first-page":"140","article-title":"Security Requirements for Cryptographic Modules","year":"2001","journal-title":"National Institute of Standards and Technology U S Department of Commerce"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/3-540-46416-6_22"},{"key":"ref7","first-page":"1187","article-title":"Enhancing wireless location privacy using silent period","author":"huang","year":"2005","journal-title":"IEEE Wireless Communications and Networking Conference (WCNC)"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-46088-8_15","article-title":"Provably secure implicit certificate schemes","author":"brown","year":"2002","journal-title":"Proc 5th International Conference on Financial Cryptography"},{"key":"ref9","article-title":"Short group signatures","author":"boneh","year":"2004","journal-title":"Advances in Cryptology - CRYPTO"},{"key":"ref1","article-title":"Postal revenue collection in the digital age","author":"pintsov","year":"2000","journal-title":"Proc 4th Int Conf Financial Cryptography"}],"event":{"name":"2010 7th IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2010,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2010,1,12]]}},"container-title":["2010 7th IEEE Consumer Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5419385\/5421566\/05421785.pdf?arnumber=5421785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T11:20:37Z","timestamp":1558869637000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5421785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2010.5421785","relation":{},"subject":[],"published":{"date-parts":[[2010,1]]}}}