{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:36Z","timestamp":1762004916701,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icccn.2017.8038492","type":"proceedings-article","created":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T16:33:46Z","timestamp":1505752426000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Securing PKI Requests for C-ITS Systems"],"prefix":"10.1109","author":[{"given":"J. P.","family":"Monteuuis","sequence":"first","affiliation":[]},{"given":"Badis","family":"Hammi","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Salles","sequence":"additional","affiliation":[]},{"given":"Houda","family":"Labiod","sequence":"additional","affiliation":[]},{"given":"Remi","family":"Blancher","sequence":"additional","affiliation":[]},{"given":"Erwan","family":"Abalea","sequence":"additional","affiliation":[]},{"given":"Brigitte","family":"Lonc","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.29"},{"journal-title":"Technical report Information Society Technologies","article-title":"AVISPA-Team. AVISPA v1.1 user manual","year":"2006","key":"ref11"},{"journal-title":"Technical report Information Society Technologies","article-title":"AVISPA-Team. HLPSL tutorial, a beginner's guide to modelling and analysing internet security protocols","year":"2006","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266520"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.31"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.205974"},{"key":"ref16","article-title":"RFC 2315: PKCS # 7: Cryptographic message syntax version 1.5","author":"kaliski","year":"1998","journal-title":"IETF"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792428"},{"key":"ref18","first-page":"22","article-title":"Formal analysis of facebook connect single sign-on authentication protocol","volume":"11","author":"miculan","year":"2011","journal-title":"SOFSEM"},{"key":"ref19","article-title":"RFC 2985: PKCS #9: Selected object classes and attribute types version 2.0","author":"nystrom","year":"2000","journal-title":"IETF"},{"journal-title":"Technical Report","article-title":"PKI system requirements specifications (v1.1) SCOOP@F Delivrable","year":"2015","key":"ref4"},{"journal-title":"Technical Report","article-title":"PKI architecture and technical specifications (v1.1), SCOOP@F Deliv-rable 2.4.4.6","year":"2015","key":"ref3"},{"journal-title":"IEEE Vehicular Technology Society Standard","year":"2016","key":"ref6"},{"journal-title":"Intelligent Transport Systems (ITS) Security Trust and Privacy Management","article-title":"ETSI TS 102 941 V1.1.12 Draft","year":"2016","key":"ref5"},{"journal-title":"Technical Report","article-title":"Security system: Integration guide v4, SCOOP@F Delivrable 2.4.4.8","year":"2016","key":"ref8"},{"journal-title":"Technical report Vehicle Safety Communications 5 Consortium","article-title":"Security credential management system proof-of-concept implementation. ee requirements and specifications supporting scms software release 1.1","year":"2016","key":"ref7"},{"journal-title":"IEEE P 1609 2\/D13","first-page":"1","year":"2012","key":"ref2"},{"journal-title":"Technical report Car2Car Communication Consortium","article-title":"C2C-CC public key infrastructure memo","year":"2011","key":"ref1"},{"journal-title":"ITS security header and certificate formats","article-title":"ETSI TS 103 097 V1.2.1: Intelligent Transport Systems (ITS)","year":"2015","key":"ref9"},{"key":"ref20","first-page":"302","article-title":"Design, implementation, and evaluation of a vehicular hardware security module","author":"wolf","year":"2011","journal-title":"Information Security and Cryptology-ICISC 2011"}],"event":{"name":"2017 26th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2017,7,31]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2017,8,3]]}},"container-title":["2017 26th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8038296\/8038338\/08038492.pdf?arnumber=8038492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T16:02:13Z","timestamp":1513180933000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8038492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icccn.2017.8038492","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}