{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:54:27Z","timestamp":1773924867104,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/dictap.2015.7113193","type":"proceedings-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T19:25:56Z","timestamp":1433359556000},"page":"173-177","source":"Crossref","is-referenced-by-count":25,"title":["Group-based authentication in V2V communications"],"prefix":"10.1109","author":[{"given":"Hamssa","family":"Hasrouny","sequence":"first","affiliation":[]},{"given":"Carole","family":"Bassil","sequence":"additional","affiliation":[]},{"given":"Abed Ellatif","family":"Samhat","sequence":"additional","affiliation":[]},{"given":"Anis","family":"Laouiti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2010.28"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1016\/j.csi.2008.03.007","article-title":"A privacy aware and efficient security infrastructure for vehicular ad hoc networks","volume":"30","author":"pl\u00f6\u00dfl","year":"2008","journal-title":"Computer Standards & Interfaces"},{"key":"ref13","article-title":"Security Architectures in V2V and V2I Communication","author":"van der heijden","year":"2010","journal-title":"Twente Student Conference on IT"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161076"},{"key":"ref15","author":"darchis","year":"2010","journal-title":"802_11 frames A starter guide to learn wireless sniffer traces"},{"key":"ref16","article-title":"Advanced intelligent transport systems (ITS) radio communications","year":"2011","journal-title":"Report ITU-R M 2228"},{"key":"ref17","article-title":"Automotive Security: Cryptography for Car2X Communication","author":"sch\u00fctze","year":"2011","journal-title":"Embedded World Conference 2011 N&#x00FC;mberg Germany"},{"key":"ref18","article-title":"Distributed Certificate Architecture for VANETs","author":"baber","year":"2009","journal-title":"IEEE Military Communications Conference (MILCOM)"},{"key":"ref19","first-page":"158","article-title":"Security and Privacy in C2X Communication","volume":"49","author":"kargl","year":"0","journal-title":"Communications Magazine IEEE"},{"key":"ref28","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073340"},{"key":"ref27","article-title":"SECURITY ISSUES IN VANET","author":"karim sakib","year":"2010","journal-title":"Department of Electrical Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784943"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2012.62"},{"key":"ref5","author":"michele weigle","year":"2008","journal-title":"Standards WAVE \/ DSRC \/ 802 11p spring"},{"key":"ref8","article-title":"Secure V2V Communication With Certificate Revocations","author":"ashwin","year":"2007","journal-title":"IEEE Mobile Networking for Vehicular Environments"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICECC.2011.6067807"},{"key":"ref2","year":"2012"},{"key":"ref9","article-title":"TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks","volume":"8","author":"chuang","year":"2013","journal-title":"Systems Journal IEEE"},{"key":"ref1","year":"2006"},{"key":"ref20","article-title":"CGI Group Inc","year":"2004","journal-title":"Public Key Encryption and Digital Signature"},{"key":"ref22","article-title":"WAVE\/DSRC Development and standardization&#x00BB;","author":"(stanley) hsu","year":"2010"},{"key":"ref21","article-title":"Introduction to Public Key Infrastructure","author":"polk","year":"2005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.005"},{"key":"ref23","first-page":"32","article-title":"Cluster-Based Framework in Vehicular Ad-Hoc Networks","author":"peng","year":"2005","journal-title":"4th International Conference ADHOC-NOW 2005"},{"key":"ref26","article-title":"Experimental Characterization of Multihop Communications in Vehicular Ad Hoc Network","author":"hui","year":"0","journal-title":"VANET'05 Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks"},{"key":"ref25","article-title":"Securing Wireless Access in Vehicular Environments (WAVE)","author":"weil","year":"2008","journal-title":"IEEE"}],"event":{"name":"2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)","location":"Beirut, Lebanon","start":{"date-parts":[[2015,4,29]]},"end":{"date-parts":[[2015,5,1]]}},"container-title":["2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7109553\/7113160\/07113193.pdf?arnumber=7113193","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T12:54:48Z","timestamp":1498222488000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7113193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/dictap.2015.7113193","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}