{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:14:33Z","timestamp":1768518873968,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,14]]},"DOI":"10.1109\/icpads67057.2025.11323143","type":"proceedings-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:36:54Z","timestamp":1768423014000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Authentication and Key Agreement Protocol for Urban Intelligent Transportation Systems"],"prefix":"10.1109","author":[{"given":"Feng","family":"Wang","sequence":"first","affiliation":[{"name":"Gansu Xinlugang Technology Co., Ltd.,Gansu,China"}]},{"given":"Fei","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Data and Intelligent System Security, Ministry of Education, China,BeiJing,China"}]},{"given":"Ziqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Data and Intelligent System Security, Ministry of Education, China,BeiJing,China"}]},{"given":"Jinquan","family":"Hou","sequence":"additional","affiliation":[{"name":"Gansu Xinlugang Technology Co., Ltd.,Gansu,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2358633"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s18051453"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3247339"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s23156708"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/app14114401"},{"issue":"6","key":"ref7","first-page":"1861","article-title":"ECPP: Efficient conditional privacy preservation protocol for transmission for VANET","volume":"9","author":"Lu","year":"2018","journal-title":"J. Ambient Intell. Humanized Comput."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57808-3_34"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.09.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00543-w"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3050399"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-011-0383-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0543-7"},{"issue":"5","key":"ref14","first-page":"351","article-title":"On the security of a secure batch verification with group testing for VANET","volume":"16","author":"Zhang","year":"2014","journal-title":"Int. J. Netw. Secur."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2993032"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2966069"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s21020665"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MASS56207.2022.00023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891105"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3246466"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2780183"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991168"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0848-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s21248206"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3019304"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.104"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2966526"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3121552"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app11031260"}],"event":{"name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","location":"Hefei, China","start":{"date-parts":[[2025,12,14]]},"end":{"date-parts":[[2025,12,18]]}},"container-title":["2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11322805\/11322871\/11323143.pdf?arnumber=11323143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T07:45:55Z","timestamp":1768463155000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11323143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icpads67057.2025.11323143","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]}}}