{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:10:18Z","timestamp":1766067018398},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cns.2019.8802649","type":"proceedings-article","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T13:55:11Z","timestamp":1566482111000},"page":"1-8","source":"Crossref","is-referenced-by-count":12,"title":["Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles"],"prefix":"10.1109","author":[{"given":"Qinlong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Nan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhicheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.06.098"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406877"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454834"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2186992"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2211905"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110312"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22450-8_15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.11.012"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423669"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.246"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503418"},{"journal-title":"The Java Pairing Based Cryptography Library","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2784395"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2797190"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255631"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2007.912927"},{"key":"ref20","first-page":"37","article-title":"Efficient and secure data storage operations for mobile cloud computing","author":"zhou","year":"0","journal-title":"in Proceedings of 8th International Conference on Network and Service Management (CNSM)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2653103"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2089544"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.05.005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.179"}],"event":{"name":"2019 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2019,6,10]]},"location":"Washington DC, DC, USA","end":{"date-parts":[[2019,6,12]]}},"container-title":["2019 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8790401\/8802631\/08802649.pdf?arnumber=8802649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:52:39Z","timestamp":1658141559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8802649\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cns.2019.8802649","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}