{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:48:48Z","timestamp":1775188128002,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/tvt.2009.2038222","type":"journal-article","created":{"date-parts":[[2009,12,16]],"date-time":"2009-12-16T20:08:02Z","timestamp":1260994082000},"page":"1606-1617","source":"Crossref","is-referenced-by-count":267,"title":["A Scalable Robust Authentication Protocol for Secure Vehicular Communications"],"prefix":"10.1109","volume":"59","author":[{"family":"Lei Zhang","sequence":"first","affiliation":[]},{"family":"Qianhong Wu","sequence":"additional","affiliation":[]},{"given":"Agusti","family":"Solanas","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Domingo-Ferrer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1234","article-title":"new explicit conditions of elliptic curve traces for fr-reduction","volume":"e84 a","author":"miyaji","year":"2001","journal-title":"IEICE Trans Fundam"},{"key":"ref38","author":"scott","year":"0","journal-title":"Efficient Implementation of Cryptographic Pairings"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.12.042"},{"key":"ref32","first-page":"246","volume":"4515","author":"camenisch","year":"2007","journal-title":"Advances CryptologyEurocrypt"},{"key":"ref31","first-page":"514","article-title":"short signatures from the weil pairing","volume":"2248","author":"boneh","year":"2001","journal-title":"Proc ASIACRYPT"},{"key":"ref30","first-page":"416","volume":"2656","author":"boneh","year":"2003","journal-title":"Advances CryptologyEurocrypt"},{"key":"ref37","first-page":"442","volume":"4450","author":"cheon","year":"2007","journal-title":"Proc Public Key Cryptography"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2034669"},{"key":"ref35","year":"2006"},{"key":"ref34","first-page":"309","article-title":"practical short signature batch verification","volume":"5473","author":"ferrara","year":"2009","journal-title":"Proc CT-RSA"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2002581"},{"key":"ref40","year":"0","journal-title":"The Network SimulatorNS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161076"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.1265539"},{"key":"ref14","author":"gollan","year":"2002","journal-title":"Digital signatures for automobiles"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref17","first-page":"41","volume":"3152","author":"boneh","year":"2004","journal-title":"Proc Adv CryptologyCRYPTO"},{"key":"ref18","first-page":"257","volume":"576","author":"chaum","year":"1991","journal-title":"Advances in CryptologyEurocrypt 1991"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref28","first-page":"78","article-title":"an efficient signcryption scheme with key privacy","volume":"4582","author":"li","year":"2007","journal-title":"Proc EuroPKI"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.007"},{"key":"ref27","first-page":"383","volume":"2729","author":"boyen","year":"2003","journal-title":"Proc Adv CryptologyCRYPTO"},{"key":"ref3","first-page":"12","article-title":"location privacy in location-based services: beyond ttp-based schemes","author":"solanas","year":"2008","journal-title":"Proc 1st Int Workshop PiLBA"},{"key":"ref6","year":"0","journal-title":"Car 2 Car Communication Consortium"},{"key":"ref29","first-page":"213","volume":"2139","author":"boneh","year":"2001","journal-title":"Proc Adv CryptologyCRYPTO"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"securing vehicular <emphasis emphasistype=\"italic\">ad hoc<\/emphasis> networks","volume":"15","author":"raya","year":"2007","journal-title":"J Comput Secur"},{"key":"ref8","year":"0"},{"key":"ref7","year":"2006"},{"key":"ref2","first-page":"2452","article-title":"security and privacy threats to its","volume":"5","author":"karger","year":"1995","journal-title":"Proc 2nd World Congr Intell Transport Syst"},{"key":"ref9","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2004.842407"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.281"},{"key":"ref21","article-title":"mix zones for location privacy in vehicular networks","author":"freudiger","year":"2007","journal-title":"Proc ACM Workshop WiN-ITS"},{"key":"ref42","first-page":"21","article-title":"location privacy in moving-object environments","volume":"2","author":"lin","year":"2009","journal-title":"Trans Data Privacy"},{"key":"ref24","first-page":"104","volume":"1109","author":"kocher","year":"1996","journal-title":"Advances in CryptologyCRYPTO 1996"},{"key":"ref41","year":"2005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref26","first-page":"165","volume":"1294","author":"zheng","year":"1997","journal-title":"Proc Adv CryptologyCRYPTO"},{"key":"ref25","first-page":"443","volume":"5479","author":"standaert","year":"2009","journal-title":"Advances CryptologyEurocrypt"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/25\/5463253\/05353646.pdf?arnumber=5353646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:45:47Z","timestamp":1633913147000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5353646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":42,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2009.2038222","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,5]]}}}