{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T21:41:30Z","timestamp":1725399690868},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/icccn.2009.5235236","type":"proceedings-article","created":{"date-parts":[[2009,9,11]],"date-time":"2009-09-11T15:26:15Z","timestamp":1252682775000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Location-Release Signature for Vehicular Communications"],"prefix":"10.1109","author":[{"given":"Xiaodong","family":"Lin","sequence":"first","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Delay Tolerant Networking Research Group","year":"2007","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1204759"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"journal-title":"Toyota Combines UHF DSRC for Road-to-vehicle Communication","year":"0","key":"16"},{"key":"13","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/3-540-44598-6_14","article-title":"on the exact security of full domain hash","author":"coron","year":"2000","journal-title":"Advances in Cryptology ? CRYPTO 2000"},{"journal-title":"The Pairing-Based Cryptography (PBC)","year":"0","author":"lynn","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"12","first-page":"268","article-title":"security proofs for identitybased identification and signature schemes","author":"bellare","year":"2004","journal-title":"Advances in Cryptology - EUROCRYPT'04"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481346"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023879"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2004.1331717"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"journal-title":"Modern Cryptography Theory and Practice","year":"2003","author":"mao","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1109\/INFOCOM.2008.179","article-title":"ecpp: efficient conditional privacy preservation protocol for secure vehicular communications","author":"lu","year":"2008","journal-title":"INFOCOM 2008"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0133-9"},{"key":"8","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology - CRYPTO 2001"}],"event":{"name":"2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009","start":{"date-parts":[[2009,8,3]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2009,8,6]]}},"container-title":["2009 Proceedings of 18th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5235208\/5235209\/05235236.pdf?arnumber=5235236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T19:38:53Z","timestamp":1497814733000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5235236\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icccn.2009.5235236","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}