{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T16:58:52Z","timestamp":1770483532343,"version":"3.49.0"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tits.2025.3537765","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T15:39:40Z","timestamp":1740065980000},"page":"6441-6450","source":"Crossref","is-referenced-by-count":4,"title":["A Decentralized, Secure, and Reliable Vehicle Platoon Formation With Privacy Protection for Autonomous Vehicles"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1048-0178","authenticated-orcid":false,"given":"Rabia","family":"Khan","sequence":"first","affiliation":[{"name":"Institute of Computing, Kohat University of Science and Technology, Kohat, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3941-4617","authenticated-orcid":false,"given":"Amjad","family":"Mehmood","sequence":"additional","affiliation":[{"name":"Institute of Computing, Kohat University of Science and Technology, Kohat, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2631-9223","authenticated-orcid":false,"given":"Houbing","family":"Song","sequence":"additional","affiliation":[{"name":"Security and Optimization for Networked Globe Laboratory (SONG Lab), University of Maryland, Baltimore County (UMBC), Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4715-212X","authenticated-orcid":false,"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[{"name":"Secure Cyber Systems Research Group (CSCRG), WMG, University of Warwick, Coventry, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2017.8264890"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271436"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275641"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s22229000"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1523"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s16060803"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3264773"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3226901"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431759"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2926313"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3221147"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3184973"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3365996"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3203724"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICITE.2019.8880167"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2019.8917188"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.30534\/ijiscs\/2018\/01722018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2954213"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7567994"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3106297"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3341358"},{"key":"ref23","first-page":"8","article-title":"Zero-knowledge proofs based delegation authentication for industrial Internet of Things in certificateless proxy signatures","volume-title":"Proc. 10th Int. Conf. Internet Things: Syst., Manage. Secur. (IOTSMS)","author":"Mehmood"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-022-01078-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2796242"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-012-0470-z"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/10988578\/10897304.pdf?arnumber=10897304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T20:51:49Z","timestamp":1770411109000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10897304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":26,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tits.2025.3537765","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}