{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T10:17:05Z","timestamp":1772446625536,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"CTDT (Centre for Technology Development and Transfer), Anna University Chennai, India","award":["600025"],"award-info":[{"award-number":["600025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/tits.2015.2492981","type":"journal-article","created":{"date-parts":[[2015,11,11]],"date-time":"2015-11-11T20:08:26Z","timestamp":1447272506000},"page":"1015-1028","source":"Crossref","is-referenced-by-count":283,"title":["Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks"],"prefix":"10.1109","volume":"17","author":[{"given":"Pandi","family":"Vijayakumar","sequence":"first","affiliation":[]},{"given":"Maria","family":"Azees","sequence":"additional","affiliation":[]},{"given":"Arputharaj","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"Lazarus","family":"Jegatha Deborah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070773"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2313631"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2335746"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2332472"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-015-0334-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273221"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2008.314"},{"key":"ref12","first-page":"2","article-title":"The TESLA broadcast authentication protocol","volume":"5","author":"perrig","year":"2002","journal-title":"RSA CryptoBytes"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MOVE.2007.4300813"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233389"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2009.9671584"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2011.02.015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.01.038"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISWTA.2011.6089388"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2156790"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2089544"},{"key":"ref27","first-page":"1","article-title":"Analysis of simplified variants of SHA-256","author":"matusiewicz","year":"0","journal-title":"Proc WEWoRC"},{"key":"ref3","first-page":"88","article-title":"Survey on security challenges in VANET","volume":"2","author":"dhamgaye","year":"2013","journal-title":"Int J Comput Sci"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"J Comput Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2226613"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2377074"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110311"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.258"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2004.842407"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.129"},{"key":"ref20","first-page":"5","article-title":"Securing vehicular communications-assumptions, requirements, and principles","author":"papadimitratos","year":"0","journal-title":"Proc 4th Workshop ESCAR"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.281"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.06.004"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2011.6060129"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.258"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0352"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/7442200\/7327222.pdf?arnumber=7327222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:11Z","timestamp":1633919651000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7327222\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":34,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tits.2015.2492981","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}