{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:40:06Z","timestamp":1762004406027},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Veh. Technol."],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/tvt.2012.2197031","type":"journal-article","created":{"date-parts":[[2012,7,10]],"date-time":"2012-07-10T20:57:34Z","timestamp":1341953854000},"page":"2715-2728","source":"Crossref","is-referenced-by-count":44,"title":["Secure Incentives for Commercial Ad Dissemination in Vehicular Networks"],"prefix":"10.1109","volume":"61","author":[{"given":"Suk-Bok","family":"Lee","sequence":"first","affiliation":[]},{"given":"Joon-Sang","family":"Park","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Gerla","sequence":"additional","affiliation":[]},{"given":"Songwu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Challenges in securing vehicular networks","author":"parno","year":"2005","journal-title":"Proc HotNets-IV"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132918"},{"key":"ref33","author":"mccanne","year":"0","journal-title":"NS Network Simulator"},{"key":"ref32","first-page":"255","article-title":"Mitigating routing misbehavior in mobile ad hoc networks","author":"marti","year":"2000","journal-title":"Proc ACM MobiCom"},{"key":"ref31","first-page":"111","author":"luo","year":"2005","journal-title":"Securing Current and Future Automotive IT Applications"},{"key":"ref30","first-page":"1510","article-title":"Reputation propagation and agreement in mobile ad-hoc networks","author":"liu","year":"2003","journal-title":"Proc IEEE WCNC"},{"key":"ref37","article-title":"AdTorrent: Digital billboards for vehicular networks","author":"nandan","year":"2005","journal-title":"Proc V2VCOM"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_14"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/0470862696"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288128"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.805060"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1109\/TVT.2009.2030892","article-title":"FleaNet: A virtual market place on vehicular networks","volume":"59","author":"lee","year":"2010","journal-title":"IEEE Trans Veh Technol"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2002.994321"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/778415.778418","article-title":"A charging and rewarding scheme for packet forwarding","author":"ben salem","year":"2003","journal-title":"Proc ACM Mobihoc"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"ref21","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45126-6_2","article-title":"A micro-payment scheme encouraging collaboration in multi-hop cellular networks","author":"jakobsson","year":"2003","journal-title":"Financial Cryptography 97"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410063"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1161252.1161268"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-4449-1"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"ref54","first-page":"270","article-title":"Security issues in a future vehicular network","author":"zarki","year":"2002","journal-title":"Proc EurWireless"},{"key":"ref53","article-title":"Inter-vehicular communication networks: A survey","author":"zanella","year":"2006","journal-title":"Proc 2nd Internal NEWCOM Workshop"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2004.1331717"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102235"},{"key":"ref11","year":"0"},{"key":"ref40","author":"passmann","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3174"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.68"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.37"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/2.955103"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313529"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"183","DOI":"10.3233\/JCS-2000-82-306","article-title":"Authentication and payment in future mobile systems","volume":"8","author":"horn","year":"2000","journal-title":"J Comput Security"},{"key":"ref18","author":"housley","year":"2002","journal-title":"Internet X 509 Public Key Infrastructure Certificate and CRL Profile"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1016527.1016532"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1145\/513800.513828","article-title":"Performance analysis of the CONFIDANT Protocol: Cooperation of nodes&#x2014; Fairness in dynamic ad-hoc networks","author":"buchegger","year":"2002","journal-title":"Proc ACM Mobihoc"},{"key":"ref6","first-page":"21","article-title":"SECTOR: Secure tracking of node encounters in multi-hop wireless networks","author":"apkun","year":"2003","journal-title":"Proc ACM Workshop SASN"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"key":"ref8","first-page":"294","article-title":"CAPTCHA: Using hard AI problems for security","author":"ahn","year":"2003","journal-title":"Proc EUROCRYPT"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023879"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089775"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023892"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022276913209"},{"key":"ref47","year":"2005","journal-title":"Second Ed TIGER\/Line Files"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030628"},{"key":"ref44","first-page":"545","article-title":"CarTALK 2000&#x2014;Safe and comfortable driving based upon inter-vehicle-communication","author":"reichardt","year":"2002","journal-title":"Proc IEEE Intell Veh Symp"},{"key":"ref43","author":"raya","year":"2006","journal-title":"Certificate revocation in vehicular networks"}],"container-title":["IEEE Transactions on Vehicular Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/25\/6236330\/06193237.pdf?arnumber=6193237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T17:55:19Z","timestamp":1714154119000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6193237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":55,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tvt.2012.2197031","relation":{},"ISSN":["0018-9545","1939-9359"],"issn-type":[{"value":"0018-9545","type":"print"},{"value":"1939-9359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7]]}}}