{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:49:04Z","timestamp":1775040544160,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/cybersec.2012.6246119","type":"proceedings-article","created":{"date-parts":[[2012,7,31]],"date-time":"2012-07-31T21:52:55Z","timestamp":1343771575000},"page":"18-22","source":"Crossref","is-referenced-by-count":17,"title":["A new security mechanism for vehicular communication networks"],"prefix":"10.1109","author":[{"given":"Ghassan","family":"Samara","sequence":"first","affiliation":[]},{"given":"Wafaa A.H. Ali","family":"Alsalihy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1614269.1614285"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"12","author":"stallings","year":"2003","journal-title":"Cryptography and Network Security Principles and Practices"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481346"},{"key":"7","author":"raya","year":"2006","journal-title":"Certificate revocation in vehicular networks"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/NETAPPS.2010.17"},{"key":"5","article-title":"Security issues and challenges of vehicular ad hoc networks (VANET)","author":"samara","year":"2010","journal-title":"4th International Conference on New Trends in Information Science and Service Science (NISS)"},{"key":"4","article-title":"Challenges in securing vehicular networks","author":"parno","year":"2005","journal-title":"Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410063"},{"key":"8","first-page":"8","article-title":"Design of simple and efficient revocation list distribution in urban areas for VANET's","author":"samara","year":"2010","journal-title":"International Journal of Computer Science"}],"event":{"name":"2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2012,6,26]]},"end":{"date-parts":[[2012,6,28]]}},"container-title":["Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6238218\/6246077\/06246119.pdf?arnumber=6246119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:47:30Z","timestamp":1490129250000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6246119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cybersec.2012.6246119","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}