{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T20:30:40Z","timestamp":1721680240014},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/tvt.2008.2007983","type":"journal-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T18:02:08Z","timestamp":1225216928000},"page":"2529-2543","source":"Crossref","is-referenced-by-count":31,"title":["PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks"],"prefix":"10.1109","volume":"58","author":[{"family":"Haojin Zhu","sequence":"first","affiliation":[]},{"family":"Xiaodong Lin","sequence":"additional","affiliation":[]},{"family":"Minghui Shi","sequence":"additional","affiliation":[]},{"family":"Pin-Han Ho","sequence":"additional","affiliation":[]},{"family":"Xuemin Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"516","article-title":"a chosen text attack on the rsa cryptosystem and some discrete logarithm schemes","volume":"218 lncs","author":"desmedt","year":"1985","journal-title":"Proc Crypto"},{"key":"ref38","first-page":"318","article-title":"single term off-line coins","volume":"765 lncs","author":"ferguson","year":"1993","journal-title":"Proc EUROCRYPT"},{"key":"ref33","first-page":"244","article-title":"how to date blind signatures","volume":"1163 lncs","author":"abe","year":"1996","journal-title":"Proc ASIACRYPT"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref31","first-page":"209","article-title":"fair blind signatures","volume":"921","author":"stadler","year":"1995","journal-title":"Proc EUROCRYPT"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1299356"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.91"},{"key":"ref36","first-page":"59","article-title":"electronic payments of small amounts","volume":"1189 lncs","author":"pedersen","year":"1996","journal-title":"Proc Cambridge Workshop Security Protocols"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_11"},{"key":"ref34","author":"rabin","year":"1979","journal-title":"Digitized signatures and public-key functions as intractable as factorization"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00347-9"},{"key":"ref27","first-page":"206","article-title":"a solution for wireless privacy and payments based on e-cash","author":"tsiounis","year":"2005","journal-title":"Proc IEEE SecureComm"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258470"},{"key":"ref2","first-page":"228","article-title":"mob: a mobile bazaar for wide-area wireless services","author":"chakravorty","year":"2005","journal-title":"Proc ACM MobiCom"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.197"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269714"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.07418"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.49"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.373"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.900525"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/ett.1063"},{"key":"ref25","article-title":"fuelling wifi deployment: a reputation-based solution","author":"ben salem","year":"2004","journal-title":"Proc WiOpt"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20040661"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877223"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-8148-z"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-006-2013-7"},{"key":"ref14","first-page":"1136","article-title":"an offline check system with reusable refunds","volume":"86","author":"kim","year":"2003","journal-title":"IEICE Trans Commun"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.548"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1593553"},{"key":"ref17","year":"0","journal-title":"Abitcool Wi-Fi Community"},{"key":"ref18","year":"0","journal-title":"Fon"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20040834"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287898"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.320"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00021-8"},{"key":"ref5","first-page":"9","article-title":"emerging issues in researching community-based wlans","volume":"46","author":"bina","year":"2005","journal-title":"J Comput Inf Syst"},{"key":"ref8","year":"0","journal-title":"802 1x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1250896"},{"key":"ref49","first-page":"144","article-title":"a localized authentication, authorization, and accounting (aaa) protocol for mobile hotspots","author":"baek","year":"2006","journal-title":"Proc 3rd Annu Conf Wireless On-Demand Netw Syst Serv WONS"},{"key":"ref9","article-title":"analysis of roaming techniques","author":"alimian","year":"0","journal-title":"IEEE 802 11-04\/0377rl"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/90.554719"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.825964"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.16"},{"key":"ref42","year":"1997","journal-title":"Working Draft Standard for RSA Diffie-Hellman and Related Public-Key Cryptography"},{"key":"ref41","author":"simmons","year":"1992","journal-title":"Contemporary Cryptology The Science Of Information Integrity"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25969-5_63"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/90.793005"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/25\/4912580\/04657374.pdf?arnumber=4657374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:50Z","timestamp":1633910450000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4657374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":49,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2008.2007983","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}