{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T13:25:11Z","timestamp":1769347511582,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/jiot.2018.2865008","type":"journal-article","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T20:36:40Z","timestamp":1537562200000},"page":"3733-3746","source":"Crossref","is-referenced-by-count":20,"title":["Secure Healthcare Data Dissemination Using Vehicle Relay Networks"],"prefix":"10.1109","volume":"5","author":[{"given":"Prabhjot","family":"Singh","sequence":"first","affiliation":[]},{"given":"Rasmeet Singh","family":"Bali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4894-4134","authenticated-orcid":false,"given":"Alexey","family":"Vinel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7986-4244","authenticated-orcid":false,"given":"Laurence T.","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"key":"ref33","first-page":"39","article-title":"Privacy representation in VANET","author":"kosa","year":"2013","journal-title":"Proc 3rd ACM Int Symp Design Anal Intell Veh Netw Appl"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416351"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.456"},{"key":"ref30","first-page":"686","article-title":"Enforcing patient privacy in healthcare WSNs using ECC implemented on 802.15.4 beacon enabled clusters","author":"mi\u0161ic","year":"2008","journal-title":"Proc 6th Annu IEEE Int Conf Pervasive Comput Commun (PerCom)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.371"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0446-y"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.01.024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.004"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3676-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70756"},{"key":"ref12","first-page":"1","article-title":"Strategies for context-adaptive message dissemination in vehicular ad hoc networks","author":"eichler","year":"2006","journal-title":"Proc 4th Annu Int Conf Mobile Ubiquitous Syst Netw Services (MobiQuitous)"},{"key":"ref13","first-page":"1","article-title":"A comparative study of data dissemination models for VANETs","author":"nadeem","year":"2006","journal-title":"Proc of the 3rd Annual International Conference on Mobile and Ubiquitous Systems (MOBIQUITOUS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.005"},{"key":"ref15","first-page":"1","year":"2004","journal-title":"An Elliptic Curve Cryptography (ECC) Primer The Certicom &#x2018;Catch the Curve&#x2019; White Paper Series"},{"key":"ref16","author":"hankerson","year":"2006","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689255"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.136"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07674-4_72"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4564481"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0463-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.11.021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.03.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2007.912927"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2009.935537"},{"key":"ref7","author":"sussman","year":"2008","journal-title":"Perspectives on Intelligent Transportation Systems (ITS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.446"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2013.0065"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.02.021"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503946"},{"key":"ref47","first-page":"50","article-title":"Responses to NIST&#x2019;s proposal","volume":"35","author":"vanstone","year":"1992","journal-title":"Commun ACM"},{"key":"ref21","first-page":"1","article-title":"simTD security architecture: Deployment of a security and privacy architecture in field operational tests","author":"bi\u00dfmeyer","year":"2009","journal-title":"Proc Embedded Security in Cars (ESCAR) Conf"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s16010118","article-title":"Defence against black hole and selective forwarding attacks for medical WSNs in the IoT","volume":"16","author":"mathur","year":"2016","journal-title":"SENSORS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601954"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.10.003"},{"key":"ref43","first-page":"527","article-title":"Network simulations with the NS-3 simulator","author":"henderson","year":"2008","journal-title":"Proceedings of ACM SIGCOMM Demonstration"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463189"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8534511\/08458227.pdf?arnumber=8458227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:28:44Z","timestamp":1643221724000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8458227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":47,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2865008","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}