{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:32:49Z","timestamp":1729650769119,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766479","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T18:16:45Z","timestamp":1305310605000},"page":"308-312","source":"Crossref","is-referenced-by-count":1,"title":["Improved anonymous group implicit certificate scheme"],"prefix":"10.1109","author":[{"given":"Nader M.","family":"Rabadi","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","article-title":"Group signatures","author":"chaum","year":"1991","journal-title":"Advances in Cryptology EUROCRYPT '91 volume 547 of Lecture Notes in Computer Science"},{"key":"ref11","article-title":"Short group signatures","author":"boneh","year":"2004","journal-title":"Advances in Cryptology-CRYPTO?98"},{"key":"ref12","article-title":"A practical and provably secure coalition-resistant group signature scheme","volume":"1880","author":"ateniese","year":"2000","journal-title":"Advances in Cryptology-CRYPTO"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/VIPMC.2003.1220469"},{"key":"ref14","article-title":"Group signatures: better efficiency and new theoretical aspects","author":"camenisch","year":"0","journal-title":"Springer"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/WCSN.2008.4772697"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CCNC.2010.5421656"},{"key":"ref17","first-page":"105","article-title":"Postal revenue collection in the digital age","author":"pintsov","year":"0","journal-title":"Proc 4th International Conference on Financial Cryptography"},{"key":"ref18","first-page":"156","article-title":"Provably secure implicit certificate schemes","author":"brown","year":"0","journal-title":"Proc 5th International Conference on Financial Cryptography"},{"key":"ref19","first-page":"562","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"year":"0","journal-title":"U S Department of Transportation's (DOT's) IntelliDrive Program","key":"ref4"},{"year":"0","journal-title":"Intelligent Transportation Systems U S Department of Transporation","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/WC-M.2006.250352"},{"key":"ref5","article-title":"CARAVAN: providing location privacy for VANET","author":"sampigethaya","year":"0","journal-title":"Proc Embedded Security in Cars (ESCAR)"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/MSP.2004.26"},{"key":"ref7","first-page":"39","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"Journal of Computer Security special Issue on Security of Ad Hoc and Sensor Networks"},{"year":"0","journal-title":"The Intelligent Transportation Society of America","key":"ref2"},{"key":"ref1","first-page":"2","article-title":"IEEE Trial-Use Standard for Wireless Access in Vehicular Environments&#x2014;Security Services for Applications and Management Messages","year":"0","journal-title":"IEEE Standard 1609"},{"key":"ref9","first-page":"1187","article-title":"Enhancing wireless location privacy using silent period","author":"huang","year":"0","journal-title":"Proc IEEE Wireless Communications and Networking Conference (WCNC)"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CCNC.2010.5421785"},{"key":"ref22","first-page":"140","article-title":"Security Requirements for Cryptographic Modules","volume":"25","year":"2001","journal-title":"National Institute of Standards and Technology U S Department of Commerce"},{"year":"0","journal-title":"Smart Card Alliance","key":"ref21"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2011,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766479.pdf?arnumber=5766479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T00:11:01Z","timestamp":1497917461000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766479","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}