{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:26:14Z","timestamp":1729617974534,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/milcom.2015.7357668","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T21:54:21Z","timestamp":1450389261000},"page":"1566-1571","source":"Crossref","is-referenced-by-count":4,"title":["Layered scalable WAVE security for VANET"],"prefix":"10.1109","author":[{"given":"Kazi J.","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Myung J.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1109\/VETECS.2007.534","article-title":"Priotity based inter-vehicle communication in vehicular ad-hoc network using IEEE 802.11e","author":"suthaputchakun","year":"2007","journal-title":"IEEE VTC 2007-Spring"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6092949"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.011773"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2007.4454834"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.2008.4481346","article-title":"Security in vehicular ad hoc networks","volume":"46","author":"lin","year":"2008","journal-title":"Communications Magazine IEEE"},{"key":"ref18","first-page":"5214","article-title":"EDR: Efficient decentralized revocation protocol for vehicular ad hoc networks","volume":"9","author":"albert","year":"2009","journal-title":"Vehicular Technology IEEE Transactions on"},{"key":"ref19","article-title":"MAAC: Message authentication acceleration protocol for vehicular ad hoc networks","author":"albert","year":"2009","journal-title":"Global Telecommunications Conference 2009 GLOBECOM 2009 IEEE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784730"},{"key":"ref3","first-page":"452","article-title":"Certificateless public key cryptography","author":"al-riyami","year":"2003","journal-title":"Advances in Cryptology-Asiacrypt"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2156790"},{"year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1578262"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1580935"},{"year":"2006","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2008.77"},{"journal-title":"Final Report NHTS Administration","article-title":"Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application","year":"0","key":"ref1"},{"key":"ref20","first-page":"172","article-title":"REP: location privacy for VANETs using random encryption periods","volume":"1","author":"albert","year":"2010","journal-title":"Mobile Networks and Applications"},{"key":"ref22","article-title":"Decision support protocol for intrusion detection in VANETs","author":"romain","year":"2013","journal-title":"Proceedings of the Third ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications"},{"key":"ref21","first-page":"6","article-title":"A hierarchical security architecture of VANET","author":"liu","year":"2013","journal-title":"International Conference on Cyberspace Technology (CCT 2013) CCT"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406877"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCOINS.2014.6868395"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0543-7"}],"event":{"name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","start":{"date-parts":[[2015,10,26]]},"location":"Tampa, FL, USA","end":{"date-parts":[[2015,10,28]]}},"container-title":["MILCOM 2015 - 2015 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347040\/7357245\/07357668.pdf?arnumber=7357668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T01:55:48Z","timestamp":1498269348000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7357668\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/milcom.2015.7357668","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}