{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:59:58Z","timestamp":1730300398525,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/tencon.2019.8929626","type":"proceedings-article","created":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T21:01:41Z","timestamp":1576184501000},"page":"1270-1274","source":"Crossref","is-referenced-by-count":2,"title":["Improving Throughput and Energy Efficiency in Vehicular Ad-Hoc Networks using Internet of Vehicles and Mobile Femto Access Points"],"prefix":"10.1109","author":[{"given":"Debasis","family":"Das","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Internet of Vehicles: Architecture, Protocols, and Security","author":"jyan","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"ref11","first-page":"1","article-title":"Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues","author":"joshua","year":"0","journal-title":"26th International Conference on Computer Communication and Networks (ICCCN)"},{"key":"ref12","first-page":"1","article-title":"Beyond-Line-of-Sight Identification by using Vehicle-to-Vehicle Communication","author":"linjun","year":"2017","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"journal-title":"Internet of Vehicles Your Next Connection","year":"0","key":"ref13"},{"key":"ref14","article-title":"Internet of Vehicles your next connection","author":"nanjie","year":"2016","journal-title":"WinWin Magazine"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.061411.00019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2603219"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.jnca.2013.08.004","article-title":"A survey on vehicular cloud computing","volume":"40","author":"whaiduzzaman","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02104-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2018.07.015"},{"key":"ref4","first-page":"380392","article-title":"A comprehensive survey on vehicular Ad-Hoc network","author":"saif","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2563980"},{"key":"ref6","first-page":"685","article-title":"Internet of Things (IoT) communication protocols: Review","author":"shadi","year":"0","journal-title":"International Conference on Information Technology (ICIT)"},{"key":"ref5","article-title":"Security Challenges in Vehicular Cloud Computing","volume":"14","author":"gongjun","year":"2013","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref8","first-page":"138","article-title":"A Lightweight Key Establishment in Wireless Sensor Network Based on Elliptic Curve Cryptography","author":"song","year":"0","journal-title":"IEEE International Conference on Intelligent Control Automatic Detection and High-End Equipment"},{"key":"ref7","first-page":"294","article-title":"Lightweight Cryptography for RFID Devices","author":"angela","year":"0","journal-title":"IET International Conference on Wireless Mobile and Multimedia Networks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2416657"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"ref9","article-title":"Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions","author":"jun","year":"2017","journal-title":"IEEE Communications Magazine"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2016.11.009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746612"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2887076"},{"key":"ref23","first-page":"1","article-title":"Lightweight Secure Message Broadcasting System for Vehicle-to-Vehicle Communication","author":"limbasiya","year":"2019","journal-title":"IEEE Systems Journal"}],"event":{"name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","start":{"date-parts":[[2019,10,17]]},"location":"Kochi, India","end":{"date-parts":[[2019,10,20]]}},"container-title":["TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8910516\/8929228\/08929626.pdf?arnumber=8929626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:25:10Z","timestamp":1658247910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8929626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/tencon.2019.8929626","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}