{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:09:18Z","timestamp":1774436958094,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/icc.2009.5199575","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T20:20:30Z","timestamp":1250022030000},"page":"1-6","source":"Crossref","is-referenced-by-count":21,"title":["Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks"],"prefix":"10.1109","author":[{"given":"J.-H.","family":"Song","sequence":"first","affiliation":[]},{"given":"V. W. S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"V. C. M.","family":"Leung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0","journal-title":"Traffic and network simulation environment VANETs"},{"key":"17","year":"0"},{"key":"18","year":"0","journal-title":"Simulation of Urban Mobility (SUMO)"},{"key":"15","year":"1985","journal-title":"Highway Capacity Manual"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1256"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.763"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071005"},{"key":"11","article-title":"mix-zones for location privacy in vehicular networks","author":"freudiger","year":"2007","journal-title":"Proc of Int'l Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186726"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73275-4_10","article-title":"on the effectiveness of changing pseudonyms to provide location privacy in vanets","author":"buttyan","year":"2007","journal-title":"Proc European Workshop Security and Privacy in Ad Hoc and Sensor Networks (ESAS)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.519"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379513"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.625"},{"key":"4","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/11964254_6","article-title":"impact of pseudonym changes on geographic routing in vanets","volume":"4357","author":"schoch","year":"2007","journal-title":"Lecture Notes in Computer Science (LNCS)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071007"}],"event":{"name":"ICC 2009 - 2009 IEEE International Conference on Communications","location":"Dresden, Germany","start":{"date-parts":[[2009,6,14]]},"end":{"date-parts":[[2009,6,18]]}},"container-title":["2009 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5198563\/5198564\/05199575.pdf?arnumber=5199575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:44:38Z","timestamp":1497825878000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5199575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icc.2009.5199575","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}