{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T18:00:18Z","timestamp":1768586418655,"version":"3.49.0"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62502446"],"award-info":[{"award-number":["62502446"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62125206"],"award-info":[{"award-number":["62125206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172276"],"award-info":[{"award-number":["62172276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ningbo Yongjiang Talent Programme","award":["2024A-402-G"],"award-info":[{"award-number":["2024A-402-G"]}]},{"name":"National Key R&#x0026;D Program of China","award":["2024YFC3308304"],"award-info":[{"award-number":["2024YFC3308304"]}]},{"name":"Yunnan Key Research Program","award":["202402AD080004"],"award-info":[{"award-number":["202402AD080004"]}]},{"name":"Shanghai Action Plan for Science, Technology and Innovation","award":["24BC3201300"],"award-info":[{"award-number":["24BC3201300"]}]},{"name":"Shanghai Action Plan for Science, Technology and Innovation","award":["25X010502613"],"award-info":[{"award-number":["25X010502613"]}]},{"name":"Oak Grove Ventures-School of Software Technology, Zhejiang University Blockchain"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tdsc.2025.3619655","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:56:39Z","timestamp":1760032599000},"page":"1608-1623","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Efficient Personalized Multi-Receiver Data Sharing With Cross-Domain Authentication for Internet of Vehicles"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8929-4106","authenticated-orcid":false,"given":"Taolong","family":"Su","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2080-3903","authenticated-orcid":false,"given":"Guanjie","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1306-9088","authenticated-orcid":false,"given":"Junqin","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1115-5652","authenticated-orcid":false,"given":"Xinkui","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5015-6095","authenticated-orcid":false,"given":"Shuiguang","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3263271"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3141731"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3305380"},{"issue":"4","key":"ref4","article-title":"Development of smart mobility infrastructure in Saudi Arabia: A benchmarking approach","volume-title":"Sustainability","volume":"15","author":"Alanazi","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3349305"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3199480"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3297327"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368364"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0052234"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3313527"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3298840"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3328324"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271110"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2024.3365848"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3319074"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3305489"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3229676"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3387934"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3314211"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3269222"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-023-01579-6"},{"key":"ref23","article-title":"Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT","volume-title":"Inf. Sci.","volume":"690","author":"Gao","year":"2025"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3305183"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3485654"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3203724"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2023806"},{"issue":"24","key":"ref28","article-title":"Lightweight and secure multi-message multi-receiver certificateless signcryption scheme for the internet of vehicles","volume-title":"Electronics","volume":"12","author":"Xu","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSP62567.2024.00015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3352016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3078806"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2025.3527409"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3520007"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3351892"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3401178"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2024.3378719"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3179727"},{"key":"ref38","first-page":"516","article-title":"CABC: A cross-domain authentication method combining blockchain with certificateless signature for IIoT","volume-title":"Future Gener. Comput. Syst.","volume":"158","author":"Feng","year":"2024"},{"issue":"3","key":"ref39","article-title":"A 3C authentication: A cross-domain, certificateless, and consortium-blockchain-based authentication method for vehicle-to-grid networks in a smart grid","volume-title":"Symmetry","volume":"16","author":"Miao","year":"2024"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3296506"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3430482"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3718736"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3457749"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2007.461"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11354469\/11198842.pdf?arnumber=11198842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T05:26:39Z","timestamp":1768541199000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11198842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":44,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3619655","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}