{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:40:06Z","timestamp":1751521206720,"version":"3.41.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Deanship of Research and Graduate Studies at King Khalid University through Small Research Project","award":["RGP1\/111\/46"],"award-info":[{"award-number":["RGP1\/111\/46"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tits.2025.3568290","type":"journal-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T17:46:32Z","timestamp":1747417592000},"page":"9214-9225","source":"Crossref","is-referenced-by-count":0,"title":["Certificate-Less Single-Use Pseudonym Scheme for Countering Trajectory Tracking Attacks in ITS"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9911-5953","authenticated-orcid":false,"given":"Abdulaziz","family":"Alshaeri","sequence":"first","affiliation":[{"name":"Department of Computer Science, King Khalid University, Abha, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3865-9217","authenticated-orcid":false,"given":"Mohamed","family":"Younis","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, Baltimore, MD, USA"}]}],"member":"263","reference":[{"volume-title":"Road Traffic Injuries","year":"2022","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100164"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771522"},{"key":"ref4","article-title":"Context-based pseudonym changing scheme for vehicular adhoc networks","author":"Emara","year":"2016","journal-title":"arXiv:1607.07656"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3125744"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583473"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.263"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2162864"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3141744"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3001381"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3437"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800907"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3279121"},{"key":"ref15","first-page":"1","article-title":"Mix-zones for location privacy in vehicular networks","volume-title":"Proc. 1st Int. Workshop Wireless Netw. Intell. Transp. Syst. (Win ITS)","author":"Freudiger"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3043640"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0461-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3303846"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/e24050648"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100559"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045740"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2019.00021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2775519"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00153"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2832201"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098496"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3360774.3368202"},{"key":"ref29","first-page":"32","article-title":"IoT security: Performance evaluation of grain, MICKEY, and trivium - lightweight stream ciphers","volume-title":"Proc. IEEE Conf. Secur. Manage.","author":"Ertaul"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-020-01489-w"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-021-01968-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3487060"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI51109.2021.00071"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.133"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2016.7835979"},{"volume-title":"Crypto++ Library 8.6, Crypto++ Library 8.7 | Free C++ Class Library of Cryptographic Schemes","year":"2022","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.09.005"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2966526"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.015"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2634623"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100535"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2736885"},{"volume-title":"PREXT: Privacy Extension for Veins VANET Simulator","year":"2016","author":"Emara","key":"ref43"},{"article-title":"Pypuf: Cryptanalysis of physically unclonable functions","year":"2021","author":"Wisiol","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2569581"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2911155"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3164436"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/11063346\/11006097.pdf?arnumber=11006097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:14:28Z","timestamp":1751519668000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11006097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":47,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tits.2025.3568290","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"type":"print","value":"1524-9050"},{"type":"electronic","value":"1558-0016"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}