{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T10:03:53Z","timestamp":1746266633479,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134242","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs"],"prefix":"10.1109","author":[{"family":"Yong Hao","sequence":"first","affiliation":[]},{"family":"Jin Tang","sequence":"additional","affiliation":[]},{"family":"Yu Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379844"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0504-90"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815102"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2002581"},{"journal-title":"The network simulator-NS2","year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462000"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","article-title":"The Sybil Attack","author":"doucer","year":"2002","journal-title":"Proc of the 1st Int Workshop on Peer-to-Peer Syst"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110311"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935244"},{"key":"ref8","article-title":"Light-weight laser-aided position verification for CASCADE","author":"ibrahim","year":"2008","journal-title":"Proc International Conference on WAVE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.009"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"Journal of Computer Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502133"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854150"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134242.pdf?arnumber=6134242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T22:01:21Z","timestamp":1561240881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6134242\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6134242","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}