{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:30:24Z","timestamp":1767918624255,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,10]]},"DOI":"10.1109\/vnc52810.2021.9644658","type":"proceedings-article","created":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T20:35:19Z","timestamp":1639773319000},"page":"190-193","source":"Crossref","is-referenced-by-count":2,"title":["SecProtobuf: Implicit Message Integrity Provision in Heterogeneous Vehicular Systems"],"prefix":"10.1109","author":[{"given":"Paul","family":"Molloy","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Khodaei","sequence":"additional","affiliation":[]},{"given":"Per","family":"Hallgren","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Thenorio","sequence":"additional","affiliation":[]},{"given":"Panos","family":"Papadimitratos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737583"},{"key":"ref11","article-title":"Vehicle Safety Communications Security Studies: Technical Design of the Security Credential Management System","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2015.2479367"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2722688"},{"key":"ref14","article-title":"Intelligent Transport Systems (ITS); Security; Security Services and Architecture","year":"2010","journal-title":"ETSI Standard TS 102 731"},{"key":"ref15","article-title":"Intelligent Transport Systems &#x2014; Dedicated Short Range Communication (DSRC) &#x2014; DSRC Application Layer","year":"2020","journal-title":"Standard"},{"key":"ref16","article-title":"XML-signature syntax and processing","volume":"12","author":"eastlake","year":"2002","journal-title":"W3C Recommendation"},{"key":"ref17","article-title":"ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)","year":"2021","journal-title":"Standard"},{"key":"ref18","article-title":"Abstract Syntax Notation One (ASN.1): Specification of basic notation","year":"2021","journal-title":"Standard"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4271\/2015-01-0288"},{"key":"ref28","first-page":"2","article-title":"Docker: lightweight linux containers for consistent development and deployment","volume":"2014","author":"merkel","year":"2014","journal-title":"Linux Journal"},{"key":"ref4","article-title":"Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Definitions","year":"2009","journal-title":"ETSI Tech TR-102-638"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2010.5453828"},{"key":"ref3","first-page":"1","article-title":"IEEE Standard for Wireless Access in Vehicular Environments (WAVE)&#x2013;Certificate Management Interfaces for End Entities","year":"2020","journal-title":"IEEE Std 1609 2 1-2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323410"},{"key":"ref5","year":"2011","journal-title":"C2C-CC"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2007.4295890"},{"key":"ref7","article-title":"Security Architecture and Mechanisms for V2V\/V2I, SeVe-Com","author":"kung","year":"2008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107093"},{"key":"ref9","year":"2015","journal-title":"PRESERVE project"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7413993"},{"key":"ref20","article-title":"Securing Vehicular Communications-Assumptions, Requirements, and Principles","author":"papadimitratos","year":"2006","journal-title":"ESCAR"},{"key":"ref22","year":"2021","journal-title":"Einride Tech"},{"key":"ref21","first-page":"5","article-title":"Beyondcorp: A New Approach to Enterprise Security","volume":"29","author":"ward","year":"2014","journal-title":"login"},{"key":"ref24","author":"varda","year":"0","journal-title":"Google Protocol Buffers Google&#x2019;s data interchange format"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/52.589257"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2268-2_59"},{"key":"ref25","year":"2021","journal-title":"We&#x2019;re building the World&#x2019;s Most Experienced Driver"}],"event":{"name":"2021 IEEE Vehicular Networking Conference (VNC)","location":"Ulm, Germany","start":{"date-parts":[[2021,11,10]]},"end":{"date-parts":[[2021,11,12]]}},"container-title":["2021 IEEE Vehicular Networking Conference (VNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9644613\/9644614\/09644658.pdf?arnumber=9644658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:58:21Z","timestamp":1652201901000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9644658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/vnc52810.2021.9644658","relation":{},"subject":[],"published":{"date-parts":[[2021,11,10]]}}}