{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T13:32:44Z","timestamp":1747229564639},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927952","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["MeLSeC: A Method for Lightweight and Secure Communication in Internet of Vehicles"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Brighente","sequence":"first","affiliation":[{"name":"University of Padova,Department of Mathematics,Padova,Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padova,Department of Mathematics,Padova,Italy"}]},{"given":"Harsha","family":"Vasudev","sequence":"additional","affiliation":[{"name":"University of Padova,Department of Mathematics,Padova,Italy"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746612"},{"journal-title":"Datagram Transport Layer Security Version 1 2 RFC 6347","year":"2012","author":"rescorla","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2657649"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422447"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891105"},{"key":"ref15","article-title":"(2019). AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment","author":"wazid","year":"0","journal-title":"IEEE Internet of Things Journal"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"ref17","first-page":"1","article-title":"The high-level protocol specification language hlpsl developed in the eu project avispa","author":"von oheimb","year":"2005","journal-title":"Proceedings of 3rd APPSEM II Workshop on Applied Semantics (APPSEM 2005)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2231792"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107989"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2603219"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2744182"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6704479"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.19184\/korlantas-jirs.v1i1.14772"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106555"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS46320.2019.00064"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2018.8710161"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"year":"0","key":"ref9","article-title":"Automated Validation of Internet Security Protocols and Applications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.03.006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981397"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2402166"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2308215"},{"key":"ref24","article-title":"A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things","author":"li","year":"2017","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2473165"},{"key":"ref26","article-title":"Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks","author":"rasheed","year":"2019","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2712772"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2022,9,12]]},"location":"Falerna, Italy","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09927952.pdf?arnumber=9927952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:37Z","timestamp":1674504757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927952\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927952","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}