{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:16:01Z","timestamp":1771024561444,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/vtc2022-fall57202.2022.10012773","type":"proceedings-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T18:52:20Z","timestamp":1674067940000},"page":"1-5","source":"Crossref","is-referenced-by-count":6,"title":["A Two-Factor Authentication Scheme for Moving Connected Vehicles"],"prefix":"10.1109","author":[{"given":"Dajiang","family":"Suo","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology,Department of Mechanical Engineering,Cambridge,MA,USA"}]},{"given":"Sanjay E.","family":"Sarma","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology,Department of Mechanical Engineering,Cambridge,MA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2016.7426684"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2945339"},{"key":"ref3","article-title":"Talking to strangers: Authentication in ad-hoc wireless networks","author":"Balfanz","year":"2002","journal-title":"NDSS."},{"key":"ref4","first-page":"83","article-title":"A security credential management system for v2x communications","year":"2019","journal-title":"Connected Vehicles"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46088-8_15"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2014.2352620"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1203-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"ref9","article-title":"Attacker model for connected and automated vehicles","volume-title":"ACM Computer Science in Car Symposium","author":"Monteuuis"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/10720107_24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.611"},{"key":"ref13","article-title":"Vehicle safety communications: protocols, security, and privacy","author":"Zhang","year":"2012"}],"event":{"name":"2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)","location":"London, United Kingdom","start":{"date-parts":[[2022,9,26]]},"end":{"date-parts":[[2022,9,29]]}},"container-title":["2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10012685\/10012692\/10012773.pdf?arnumber=10012773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T08:46:34Z","timestamp":1707468394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10012773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/vtc2022-fall57202.2022.10012773","relation":{},"subject":[],"published":{"date-parts":[[2022,9]]}}}