{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T10:10:10Z","timestamp":1772791810584,"version":"3.50.1"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tits.2017.2775519","type":"journal-article","created":{"date-parts":[[2017,12,15]],"date-time":"2017-12-15T22:20:00Z","timestamp":1513376400000},"page":"3400-3405","source":"Crossref","is-referenced-by-count":17,"title":["An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0754-2569","authenticated-orcid":false,"given":"David","family":"Forster","sequence":"first","affiliation":[]},{"given":"Hans","family":"Lohr","sequence":"additional","affiliation":[]},{"given":"Anne","family":"Gratz","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Petit","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3800-8369","authenticated-orcid":false,"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Mix-zones for location privacy in vehicular networks","author":"freudiger","year":"2007","journal-title":"Proc Int Workshop Wireless Netw Intell Trans Syst"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737592"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-73275-4_10","article-title":"On the effectiveness of changing pseudonyms to provide location privacy in VANETs","author":"butty\u00e1n","year":"2007","journal-title":"Security and Privacy in Ad-hoc and Sensor Networks"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.05.004"},{"key":"ref15","first-page":"165","article-title":"Simulation-based evaluation of techniques for privacy protection in VANETs","author":"tomandl","year":"2012","journal-title":"Proc IEEE 8th Int Conf Wireless Mobile Comput Netw Commun"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1599","DOI":"10.1016\/j.jnca.2013.02.003","article-title":"Cooperative pseudonym change scheme based on the number of neighbors in VANETs","volume":"36","author":"pan","year":"2013","journal-title":"J Netw Comput Appl"},{"key":"ref17","first-page":"19:1","article-title":"A framework for evaluating pseudonym strategies in vehicular ad-hoc networks","author":"f\u00f6rster","year":"2015","journal-title":"Proc ACM Conf Security Privacy Wireless Mobile Netw"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2015.7385539"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2017545"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref3","first-page":"1","article-title":"Connected vehicles: Surveillance threat and mitigation","author":"petit","year":"2015","journal-title":"Proc Black Hat Europe"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.519"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2010.5437115"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2010.5698239"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"ref9","first-page":"1","article-title":"CARAVAN: Providing location privacy for VANET","author":"sampigethaya","year":"2005","journal-title":"Embedded Security in Cars (ESCAR)"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/8478838\/08214224.pdf?arnumber=8214224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:34:46Z","timestamp":1643186086000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8214224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":19,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tits.2017.2775519","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}