{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:03:05Z","timestamp":1771063385323,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T00:00:00Z","timestamp":1673395200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T00:00:00Z","timestamp":1673395200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003661","name":"Korea Institute for Advancement of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,11]]},"DOI":"10.1109\/icoin56518.2023.10048986","type":"proceedings-article","created":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:26:40Z","timestamp":1677090400000},"page":"801-805","source":"Crossref","is-referenced-by-count":6,"title":["A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC)"],"prefix":"10.1109","author":[{"given":"Jiho","family":"Lim","sequence":"first","affiliation":[{"name":"Ajou University,Dept. of Knowledge Information Engineering,Suwon,Republic of Korea"}]},{"given":"Hansu","family":"Oh","sequence":"additional","affiliation":[{"name":"Ajou University,Dept. of Cyber Security,Suwon,Republic of Korea"}]},{"given":"Kichun","family":"Sim","sequence":"additional","affiliation":[{"name":"Ajou University,Dept. of Knowledge Information Engineering,Suwon,Republic of Korea"}]},{"given":"Sunyoung","family":"Kim","sequence":"additional","affiliation":[{"name":"Ajou University,Dept. of Knowledge Information Engineering,Suwon,Republic of Korea"}]},{"given":"Ki-Hyung","family":"Kim","sequence":"additional","affiliation":[{"name":"Ajou University,Dept. of Cyber Security,Suwon,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"The effects of OFDM design parameters on the V2X communication performance: A survey, Vehicular Communications","volume-title":"Vehicular Communication","volume":"7","author":"Srslan","year":"2017"},{"key":"ref2","article-title":"Security Credential Management System (SCMS) Technical Primer","year":"2019"},{"key":"ref3","first-page":"674","article-title":"Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks","volume-title":"Proc. 17th IEEE Int. Conf. Trust Security Privacy Comput. Commun. 12th IEEE Int. Conf. Big Data Sci. Eng. (TrustCom\/BigDataSE)","author":"Malik"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2022.3141727"},{"key":"ref5","article-title":"Security issues and challenges in V2X: A Survey","volume-title":"Computer Networks","volume":"169","author":"Ghosal","year":"2020"},{"key":"ref6","article-title":"National Security Credential Management System (SCMS) Deployment Support: SCMS Baseline Summary Report","author":"Joshua","year":"2018","journal-title":"United States. Dept. of Transportation"},{"key":"ref7","article-title":"Decentralized Identifiers (DIDs) v1.0","author":"Sporny","year":"2022"},{"key":"ref8","article-title":"Verifiable Credentials Data Model v1.1","author":"Sporny","year":"2022"},{"key":"ref9","article-title":"Hyperledger Indy","author":"Foundation","year":"2018"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1109\/ICCE46568.2020.9043086","article-title":"SS-DPKI: Self-Signed Certificate Based Decentralized Public Key Infrastructure for Secure Communication","volume-title":"2020 IEEE International Conference on Consumer Electronics (ICCE)","author":"Chu"},{"key":"ref11","article-title":"Self-Sovereign Identity","author":"Preukschat","year":"2021"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1109\/ICDCS.2013.53","article-title":"RBFT: Redundant Byzantine Fault Tolerance","volume-title":"2013 IEEE 33rd International Conference","author":"Aublin"},{"key":"ref13","first-page":"117,716","article-title":"A traceable blockchain-based access authentication system with privacy preservation in VANETs","volume-title":"IEEE Access","volume":"7","author":"Zheng","year":"2019"}],"event":{"name":"2023 International Conference on Information Networking (ICOIN)","location":"Bangkok, Thailand","start":{"date-parts":[[2023,1,11]]},"end":{"date-parts":[[2023,1,14]]}},"container-title":["2023 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10048895\/10048896\/10048986.pdf?arnumber=10048986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:21:35Z","timestamp":1707848495000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10048986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icoin56518.2023.10048986","relation":{},"subject":[],"published":{"date-parts":[[2023,1,11]]}}}