{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T16:05:04Z","timestamp":1771257904540,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890940","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:43:34Z","timestamp":1410349414000},"page":"199-206","source":"Crossref","is-referenced-by-count":15,"title":["Secure VANET applications with a refined group signature"],"prefix":"10.1109","author":[{"given":"Mohammad Saiful Islam","family":"Mamun","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2009.5416380"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2007.4295890"},{"key":"36","year":"0"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03944-7_1"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_34"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484382"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E93.A.50"},{"key":"16","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/978-3-642-00862-7_21","article-title":"Practical short signature batch verification","author":"ferrara","year":"2009","journal-title":"Topics in CryptologyCTRSA 2009"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414470"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.01.081219"},{"key":"37","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25243-3_10"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"21","article-title":"Quasi-efficient revocation of group signatures","author":"ateniese","year":"2002","journal-title":"Financial Crypto 2002 Lecture Notes in Computer Science (LNCS)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478425"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44586-2_15","article-title":"Efficient revocation in group signatures","author":"bresson","year":"2001","journal-title":"Proceedings of Public Key Cryptography (PKC'2001)"},{"key":"23","first-page":"41","article-title":"Short group signatures","author":"boneh","year":"2004","journal-title":"CRYPTO LNCS(3152)"},{"key":"24","first-page":"218","article-title":"Batch groth-sahai","author":"blazy","year":"2010","journal-title":"Proc ACNS 2010 Volume 6123 of LNCS"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17455-1_9"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/11908739_8"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/LightSec.2011.12"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34883-9_4"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"2","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","article-title":"Group signatures","author":"chaum","year":"1991","journal-title":"EUROCRYPT Volume 547 of Lecture Notes in Computer Science"},{"key":"10","article-title":"An efficient batch verification system for large scale VANET","author":"mamun","year":"2014","journal-title":"Journal of Security and Communication Networks (SCN)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"30","first-page":"436","article-title":"On a group signature scheme supporting batch verification for vehicular networks","author":"lingbo","year":"2011","journal-title":"IEEE Multimedia Information Network and Security (MINES2011)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25243-3_10"},{"key":"5","first-page":"128","article-title":"Revocation of direct anonymous attestation","author":"liqun","year":"2011","journal-title":"Trusted Systems"},{"key":"31","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/11958239_12","article-title":"Escrowed linkability of ring signatures and its applications","author":"chow","year":"2006","journal-title":"Progress in Cryptology - VIETCRYPT 2006"},{"key":"4","article-title":"Security architecture for vehicular communication","author":"gerlach","year":"2007","journal-title":"The 5th International Workshop on Intelligent Transportation"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_31"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.05.005"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","location":"Toronto, ON, Canada","start":{"date-parts":[[2014,7,23]]},"end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890940.pdf?arnumber=6890940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T16:12:49Z","timestamp":1498147969000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890940","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}