{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:24:22Z","timestamp":1761675862044,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/infcom.2011.5935026","type":"proceedings-article","created":{"date-parts":[[2011,7,7]],"date-time":"2011-07-07T14:59:10Z","timestamp":1310050750000},"page":"2147-2155","source":"Crossref","is-referenced-by-count":71,"title":["STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs"],"prefix":"10.1109","author":[{"given":"Xiaodong","family":"Lin","sequence":"first","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"ref12","article-title":"The exact security of an identity based signature and its applications","author":"libert","year":"2004","journal-title":"Tech Rep"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1145\/1755688.1755723","article-title":"Secure provenance: the essential of bread and butter of data forensics in cloud computing","author":"lu","year":"2010","journal-title":"ASIACCS"},{"key":"ref14","article-title":"Cars: Context-aware rate selection for vehicular networks","author":"shankar","year":"2008","journal-title":"ICNP"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.227"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.901869"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2014455"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2474","DOI":"10.1109\/TVT.2007.912332","article-title":"An efcient path pruning algorithm for geographical routing in wireless networks","volume":"57","author":"ma","year":"2008","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.907319"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462161"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.62"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683313"}],"event":{"name":"IEEE INFOCOM 2011 - IEEE Conference on Computer Communications","start":{"date-parts":[[2011,4,10]]},"location":"Shanghai, China","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5888673\/5934870\/05935026.pdf?arnumber=5935026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T20:33:45Z","timestamp":1560371625000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5935026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/infcom.2011.5935026","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}