{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T17:14:36Z","timestamp":1724519676340},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266468","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T17:59:13Z","timestamp":1443117553000},"source":"Crossref","is-referenced-by-count":5,"title":["A novel cryptography based privacy preserving solution for urban mobility and traffic control"],"prefix":"10.1109","author":[{"given":"Mohamad","family":"Badra","sequence":"first","affiliation":[]},{"given":"Elyes","family":"Ben Hamida","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/11428572_10","article-title":"A Formal Model of Obfuscation and Negotiation for Location Privacy","author":"duckham","year":"2005","journal-title":"Third International Conference on Pervasive Computing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937506"},{"key":"ref14","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"krawczyk","year":"1997","journal-title":"IETF RFC 2104"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.019"},{"key":"ref16","article-title":"Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)","author":"eronen","year":"2005","journal-title":"ETF RFC 4279"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296441"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6423189"},{"key":"ref3","article-title":"Floating Car Data From Smartphones: What Google and Wazw know about you and how hackers can control traffic","author":"jeske","year":"2013","journal-title":"BlackHat Europe 2013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.08.005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2252618"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2013.6526720"},{"key":"ref7","article-title":"Traffic-aware multiple mix zone placement for protecting location privacy","author":"liu","year":"2012","journal-title":"IEEE INFOCOM"},{"key":"ref2","article-title":"The World in 2014: ICT Facts and Figures","year":"2014","journal-title":"International Telecommunication Union"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.031412.00077"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","location":"Paris, France","start":{"date-parts":[[2015,7,27]]},"end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266468.pdf?arnumber=7266468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T19:28:35Z","timestamp":1567193315000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266468","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}