{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:11:08Z","timestamp":1729649468142,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/vetecf.2010.5594521","type":"proceedings-article","created":{"date-parts":[[2010,10,6]],"date-time":"2010-10-06T09:03:06Z","timestamp":1286355786000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Using Security Context Pre-Transfer to Provide Security Handover Optimization for Vehicular Ad Hoc Networks"],"prefix":"10.1109","author":[{"given":"Kaiping","family":"Xue","sequence":"first","affiliation":[]},{"given":"Peilin","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Xiaolei","family":"Tie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"14","article-title":"Privacy-Preserving Quick Authentication in Fast Roaming Networks","author":"liu","year":"2006","journal-title":"Proceedings of 31st IEEE conference on Local Computer Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2006.10.003"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C","year":"1996","author":"schneier","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784924"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410051"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.282"},{"key":"ref8","article-title":"Cross-layer design vehicle-aided handover scheme in VANETs","author":"chiu","year":"2009","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209200"},{"key":"ref2","first-page":"14","article-title":"MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks","author":"burgess","year":"2008","journal-title":"Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008)"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"Journal of Computer Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784943"}],"event":{"name":"2010 IEEE Vehicular Technology Conference (VTC 2010-Fall)","start":{"date-parts":[[2010,9,6]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2010,9,9]]}},"container-title":["2010 IEEE 72nd Vehicular Technology Conference - Fall"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5593293\/5594061\/05594521.pdf?arnumber=5594521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T03:51:25Z","timestamp":1559706685000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5594521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/vetecf.2010.5594521","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}