{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:27:04Z","timestamp":1773840424804,"version":"3.50.1"},"reference-count":204,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61733002"],"award-info":[{"award-number":["61733002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502075"],"award-info":[{"award-number":["61502075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632014"],"award-info":[{"award-number":["61632014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772508"],"award-info":[{"award-number":["61772508"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["81401570"],"award-info":[{"award-number":["81401570"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2014CB744600"],"award-info":[{"award-number":["2014CB744600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Fundamental Research Funds for the Central University","award":["DUT17LAB16"],"award-info":[{"award-number":["DUT17LAB16"]}]},{"name":"Fundamental Research Funds for the Central University","award":["DUT2017TB02"],"award-info":[{"award-number":["DUT2017TB02"]}]},{"name":"Fundamental Research Funds for the Central University","award":["DUT17RC(4)49"],"award-info":[{"award-number":["DUT17RC(4)49"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018T110210"],"award-info":[{"award-number":["2018T110210"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen\u2013Hong Kong Innovative Project","award":["SGLH20161212140718841"],"award-info":[{"award-number":["SGLH20161212140718841"]}]},{"name":"Guangdong Technology","award":["2016B010108010"],"award-info":[{"award-number":["2016B010108010"]}]},{"name":"Guangdong Technology","award":["2016B010125003"],"award-info":[{"award-number":["2016B010125003"]}]},{"name":"Guangdong Technology","award":["2017B010110007"],"award-info":[{"award-number":["2017B010110007"]}]},{"name":"Shenzhen Technology Project","award":["JCYJ20170413152535587"],"award-info":[{"award-number":["JCYJ20170413152535587"]}]},{"name":"Shenzhen Technology Project","award":["JSGG20160331185256983"],"award-info":[{"award-number":["JSGG20160331185256983"]}]},{"name":"Shenzhen Technology Project","award":["JSGG20160229115709109"],"award-info":[{"award-number":["JSGG20160229115709109"]}]},{"name":"Tianjin Key Laboratory of Advanced Networking"},{"DOI":"10.13039\/501100004712","name":"Tianjin University of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004712","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/comst.2018.2882064","type":"journal-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T00:31:08Z","timestamp":1542673868000},"page":"1314-1345","source":"Crossref","is-referenced-by-count":144,"title":["Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4098-6399","authenticated-orcid":false,"given":"Xiaojie","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7870-5524","authenticated-orcid":false,"given":"Zhaolong","family":"Ning","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5408-8752","authenticated-orcid":false,"given":"MengChu","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4952-699X","authenticated-orcid":false,"given":"Xiping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8561-5092","authenticated-orcid":false,"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1006-7594","authenticated-orcid":false,"given":"Fei Richard","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3514-5413","authenticated-orcid":false,"given":"Bin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2017.08.011"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2768558"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986479"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2651801"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2017.2734817"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2013.6692745"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292335"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2199145"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986478"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2878035"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2855163"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.13088\/jiis.2016.22.1.107"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2613869"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038391"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2733001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510894"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864782"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2584079"},{"key":"ref36","first-page":"1559","article-title":"SIRC: A secure incentive scheme for reliable cooperative downloading in highway VANETs","volume":"18","author":"lai","year":"2017","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2791428"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2635081"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2243437"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.022"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27119-4_4"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.142"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2641467"},{"key":"ref189","article-title":"Network mobility (NEMO) basic support protocol","author":"devarapalli","year":"2004"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2513399"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2329481"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2251924"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1435497.1435505"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6979949"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.07.011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320091"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2818888"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2718178"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600679"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.02.017"},{"key":"ref23","first-page":"155","article-title":"Security and privacy in vehicular social networks","author":"jin","year":"2016","journal-title":"Vehicular Social Networks"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2903745"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.09.001"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.06.004"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2017.7918122"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2311015"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2321666"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2812851"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849249"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0127-9"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218390"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036781"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.05.013"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.008"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.30"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.03.002"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2487262"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700587"},{"key":"ref55","article-title":"5G-enabled devices and smart-spaces in social-IoT: An overview","author":"al-turjman","year":"2017","journal-title":"Future Gener Comput Syst"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2808190"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2766090"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.01.036"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567063"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.62"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2799545"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869797"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557784"},{"key":"ref162","first-page":"13","article-title":"Exploiting wireless channel randomness to generate keys for automotive cyber-physical system security","author":"wan","year":"2016","journal-title":"Proc 7th Int Conf Cyber-Physical Syst"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/s13177-017-0136-4"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999759"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701065"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402268"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2593051"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600263"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453481"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2681965"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794996"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2504487"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355189"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.01.004"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7390968"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2661201"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2665499"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2868616"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875917"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.05.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.07.001"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1201\/9781315103600-6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2423667"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.015"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.06.012"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883988"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2736885"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2583466"},{"key":"ref74","first-page":"20","article-title":"Geocast routing protocols for VANETs: Survey and geometry-driven scheme proposal","volume":"3","author":"allal","year":"2013","journal-title":"J Internet Serv Inf Security"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2797023"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684211"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567034"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847249"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917564"},{"key":"ref61","first-page":"1","article-title":"Privacy-preserving data forwarding in VANETs: A personal-social behavior based approach","author":"ni","year":"2018","journal-title":"Proc IEEE Globecom"},{"key":"ref63","first-page":"27","article-title":"Aurasium: Practical policy enforcement for Android applications","author":"xu","year":"2012","journal-title":"Proc Usenix Security Symp"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2789333"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2522379"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2449893"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.041"},{"key":"ref68","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"petit","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2016.7430705"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701148"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2360516"},{"key":"ref199","first-page":"993","article-title":"A practical wireless attack on the connected car and security protocol for in-vehicle CAN","volume":"16","author":"woo","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.014"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2440103"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2738018"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2569090"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2645478"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2614976"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2477164"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081072"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407326"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.031"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2476466"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2466651"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248419"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973766"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2541862"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7348023"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0406-y"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2764259"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2657649"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2758756"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2709784"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2778939"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2686451"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"235","DOI":"10.12988\/ces.2015.5121","article-title":"A survey on security challenges and malicious vehicle detection in vehicular ad hoc networks","volume":"8","author":"neha","year":"2015","journal-title":"Contemp Eng Sci"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2797190"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.008"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399291"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973778"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510598"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510316"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510349"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2017.7510736"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/11958239_12"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2294032"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868502"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.263"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2763145"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_30"},{"key":"ref133","article-title":"Chameleon hashing and signatures","author":"krawczyk","year":"2000"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.277"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2777990"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.12.112120"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2011.86"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.10.011"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812166"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-014-4212-5"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2231792"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2245971"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108459"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116532"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2388581"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2816590"},{"key":"ref144","first-page":"1827","article-title":"DTM2: Adapting job market signaling for distributed trust management in vehicular ad hoc networks","author":"haddadou","year":"2013","journal-title":"Proc IEEE ICC"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2611524"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842180"},{"key":"ref109","author":"schneier","year":"2007","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.09.011"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/TPDS.2014.2308215","article-title":"ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs","volume":"26","author":"li","year":"2015","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504071"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2480699"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","article-title":"Pseudonym changing at social spots: An effective strategy for location privacy in VANETs","volume":"61","author":"lu","year":"2012","journal-title":"IEEE Trans Veh Technol"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399297"},{"key":"ref112","first-page":"1","article-title":"The TESLA broadcast authentication protocol","volume":"5","author":"perrig","year":"2005","journal-title":"RSA CryptoBytes"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2764384"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7180506"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2371245"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2319555"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/838391"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2371813"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2416657"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.12.004"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2006.344746"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2820039"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2302296"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2653103"},{"key":"ref113","author":"goh","year":"2007","journal-title":"Encryption Schemes from Bilinear Maps"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2502322"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406877"},{"key":"ref120","first-page":"55","article-title":"Utilization of ID-based proxy blind signature based on ECDLP in secure vehicular communications","volume":"3","author":"prabhadevi","year":"2013","journal-title":"International Journal of Engineering and Innovative Technology"},{"key":"ref121","first-page":"1338","article-title":"Proxy signatures: Delegation of the power to sign messages","volume":"79","author":"mambo","year":"1996","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.04.033"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8727625\/08539991.pdf?arnumber=8539991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:07:46Z","timestamp":1657746466000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8539991\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":204,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2018.2882064","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}