{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T04:57:16Z","timestamp":1758862636713,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/iotsms48152.2019.8939216","type":"proceedings-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T01:28:43Z","timestamp":1578014923000},"page":"366-373","source":"Crossref","is-referenced-by-count":7,"title":["Secure V2V Communication with Identity-based Cryptography from License Plate Recognition"],"prefix":"10.1109","author":[{"given":"Tudor","family":"Andreica","sequence":"first","affiliation":[]},{"given":"Bogdan","family":"Groza","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6515060"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2013.6799876"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCSN.2008.4772697"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2012.V4.627"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"volume-title":"Next generation of automotive security: secure hardware and secure open platforms","year":"2010","author":"Groll","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"ref9","article-title":"Vehicle-to-vehicle communications: readiness of v2v technology for application","volume-title":"Technical report, United States. National Highway Traffic Safety Administration","author":"Harding","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0046"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161083"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"ref13","article-title":"Sevecom-secure vehicle communication","volume-title":"Technical report","author":"Leinm\u00fcller","year":"2006"},{"key":"ref14","volume-title":"Direct vehicle-to-vehicle communication with infrastructure assistance in 5g network","volume":"08","author":"Lianghai","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481346"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s19143165"},{"key":"ref19","article-title":"Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels","author":"Rowan","year":"2017","journal-title":"arXiv preprint arXiv:1704.02553"},{"key":"ref20","first-page":"1","article-title":"Security concepts and issues in intra-inter vehicle communication network","volume-title":"Proceedings of the International Conference on Security and Management (SAM)","author":"Saed"},{"key":"ref21","first-page":"4","article-title":"Automotive security: Cryptography for car2x communication","volume-title":"Embedded World Conference","volume":"3","author":"Sch\u00fctze"},{"key":"ref22","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume-title":"Workshop on the theory and application of cryptographic techniques","author":"Shamir"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2012.6366067"},{"volume-title":"PRESERVE - D1.1 - Security Requirements of Vehicle Security Architecture","year":"2010","author":"Stotz","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2010.14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2503752"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.258"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2014.6968313"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICIOT.2017.12"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.022012.120073"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"}],"event":{"name":"2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","start":{"date-parts":[[2019,10,22]]},"location":"Granada, Spain","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8924808\/8939160\/08939216.pdf?arnumber=8939216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:15:00Z","timestamp":1706055300000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8939216\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iotsms48152.2019.8939216","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}