{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:56:08Z","timestamp":1756000568849,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T00:00:00Z","timestamp":1695513600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,24]]},"DOI":"10.1109\/itsc57777.2023.10422518","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:32:39Z","timestamp":1707867159000},"page":"4086-4093","source":"Crossref","is-referenced-by-count":5,"title":["H3PC: Enhanced Security and Privacy-Preserving Platoon Construction Based on Fully Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Badreddine","family":"Chah","sequence":"first","affiliation":[{"name":"CIAD UMR 7533, Univ. Bourgogne-Franche-Comt&#x00E9;, UTBM,Belfort,France,F-90010"}]},{"given":"Alexandre","family":"Lombard","sequence":"additional","affiliation":[{"name":"CIAD UMR 7533, Univ. Bourgogne-Franche-Comt&#x00E9;, UTBM,Belfort,France,F-90010"}]},{"given":"Anis","family":"Bkakria","sequence":"additional","affiliation":[{"name":"IRT SystemX,Palaiseau,France,91120"}]},{"given":"Abdeljalil","family":"Abbas-Turki","sequence":"additional","affiliation":[{"name":"CIAD UMR 7533, Univ. Bourgogne-Franche-Comt&#x00E9;, UTBM,Belfort,France,F-90010"}]},{"given":"Reda","family":"Yaich","sequence":"additional","affiliation":[{"name":"IRT SystemX,Palaiseau,France,91120"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27335-8_9-1"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.procs.2022.10.117","article-title":"Privacy Threat Analysis for Connected and autonomous vehicles","volume":"210","author":"Badreddine","year":"2022","journal-title":"Procedia Computer Science"},{"key":"ref3","article-title":"Vehicle platooning: A brief survey and categorization","volume-title":"International Design Engineering Technical Conferences and Computers and Information in Engineering Conference","volume":"54808","author":"Pooja","year":"2011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s23031509"},{"volume-title":"EU General Data Protection Regulation","year":"2016","key":"ref5"},{"journal-title":"ENISA good practices for security of Smart Cars","year":"2019","key":"ref6"},{"journal-title":"Commission National for Information and Freedom","article-title":"CONNECTED VEHICLES AND PERSONAL DATA","year":"2017","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref9","article-title":"Fully homomorphic encryption from ring-LWE and security for key dependent messages","volume-title":"Advances in Cryptology-CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2011. Proceedings 31","author":"Zvika","year":"2011"},{"issue":"3","key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2633600","article-title":"(Leveled) fully homomorphic encryption without bootstrapping","volume":"6","author":"Zvika","year":"2014","journal-title":"ACM Transactions on Computation Theory (TOCT)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref12","article-title":"Approx-imate homomorphic encryption with reduced approximation error","volume-title":"Topics in Cryptology-CT-RSA 2022: Cryptographers Track at the RSA Conference 2022, Virtual Event, March 1\u20132, 2022, Proceedings","author":"Andrey","year":"2022"},{"key":"ref13","article-title":"Somewhat practical fully homomorphic encryption","author":"Junfeng","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77287-1_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77287-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"ref17","article-title":"Efficient bootstrapping for approximate homomorphic encryption with non-sparse keys","volume-title":"Advances in Cryp-tology-EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321, 2021, Proceedings, Part I","author":"Jean-Philippe","year":"2021"},{"key":"ref18","article-title":"Order-preserving symmetric encryption","volume-title":"Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26\u201330, 2009. Proceedings 28","author":"Alexandra","year":"2009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77287-1_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_15"},{"key":"ref21","article-title":"Applications of division by convergence","author":"Goldschmidt","year":"1964","journal-title":"Diss. Massachusetts Institute of Technology"},{"volume-title":"The Preparation of Programs for an Electronic Digital Computer: With special reference to the EDSAC and the Use of a Library of Subroutines","year":"1951","author":"Wilkes","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.26"}],"event":{"name":"2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC)","start":{"date-parts":[[2023,9,24]]},"location":"Bilbao, Spain","end":{"date-parts":[[2023,9,28]]}},"container-title":["2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10420842\/10420843\/10422518.pdf?arnumber=10422518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:56:36Z","timestamp":1725425796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10422518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,24]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/itsc57777.2023.10422518","relation":{},"subject":[],"published":{"date-parts":[[2023,9,24]]}}}