{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:11:57Z","timestamp":1772907117165,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100016692","name":"Key Research and Development Program of Ningbo","doi-asserted-by":"publisher","award":["2024Z111"],"award-info":[{"award-number":["2024Z111"]}],"id":[{"id":"10.13039\/100016692","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1705703"],"award-info":[{"award-number":["2019YFB1705703"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/jiot.2025.3625445","type":"journal-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T18:05:59Z","timestamp":1761588359000},"page":"55708-55724","source":"Crossref","is-referenced-by-count":1,"title":["A Code-Based Anonymous Authentication Scheme for Vehicular Ad Hoc Networks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6418-3887","authenticated-orcid":false,"given":"Xin","family":"Lin","sequence":"first","affiliation":[{"name":"School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1569-7640","authenticated-orcid":false,"given":"Yusun","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Automation and Intelligent Sensing, the Key Laboratory of System Control and Information Processing, the Ministry of Education of China, and Shanghai Key Laboratory of Perception and Control in Industrial Network Systems, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5588-9931","authenticated-orcid":false,"given":"Zihao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0472-6308","authenticated-orcid":false,"given":"Junpeng","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Automation and Intelligent Sensing, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13132673"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981934"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/gcwcn.2018.8668638"},{"key":"ref5","first-page":"1","article-title":"An ID-based framework achieving privacy and non-repudiation","volume-title":"Proc. IEEE Mil. Commun. Conf. MILCOM","author":"Jinyuan"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_32"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2018.00045"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2915794"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"ref11","first-page":"114","article-title":"A public-key cryptosystem based on algebraic","volume":"4244","author":"McEliece","year":"1978","journal-title":"Coding Thv"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.458"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2051468"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357669"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.36"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35130-3_15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISDPE.2007.53"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2294032"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2017.8079039"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8545"},{"key":"ref23","article-title":"A survey on code-based cryptography","author":"Weger","year":"2022","journal-title":"arXiv:2201.07119"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_12"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0276-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55227-9_18"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_38"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3259767"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2024.114407"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_10"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38616-9_1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11659-4_6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03326-2_3"},{"key":"ref34","article-title":"Wave: A new code-based signature scheme","author":"Debris-Alazard","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026989"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8739-9_12"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/11554868_6"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39555-5_7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1268"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797654"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620590"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98365-9_6"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_2"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77224-8_21"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-46588-1_19"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3327400"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/NANA.2018.8648750"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"ref55","article-title":"Implementation security of quantum cryptography-introduction, challenges, solutions","author":"Lucamarini","year":"Jul. 2018"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11293846\/11216973.pdf?arnumber=11216973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T18:48:04Z","timestamp":1765478884000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11216973\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":55,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3625445","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,15]]}}}