{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:51:54Z","timestamp":1730303514431,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/vtcfall.2019.8891548","type":"proceedings-article","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T17:38:55Z","timestamp":1573666735000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Towards Secure Communication for High-Density Longitudinal Platooning"],"prefix":"10.1109","author":[{"given":"Markus","family":"Sontowski","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Kopsell","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Zimmermann","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Weinand","sequence":"additional","affiliation":[]},{"given":"Hans D.","family":"Schotten","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Bissmeyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Scalable protocols for authenticated group key exchange","author":"katz","year":"2003","journal-title":"Annual International Cryptology Conference"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.10.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"key":"ref12","article-title":"Security challenges and implementation mechanism for vehicular ad hoc network","volume":"2","author":"nasir","year":"2013","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref13","article-title":"Security aspects of inter-vehicle communications","author":"raya","year":"2005","journal-title":"Proceedings of the 5th Swiss Transport Research Conference (STRC)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120028"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1145\/2714576.2714619","article-title":"Vehicular platooning in an adversarial environment","author":"dadras","year":"2015","journal-title":"Proceedings of the 10th ACM Symposium on Information Computer and Communications Security ser ASIA CCS &#x2019;15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523658"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1145\/2766498.2766505","article-title":"Is your commute driving you crazy?: A study of misbehavior in vehicular platoons","author":"debruhl","year":"2015","journal-title":"Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks ser WiSec &#x2019;15"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2014.7013324"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.03.014"},{"journal-title":"Deliverable 2 1c &#x2013; towards a 5g netmobil security architecture Security requirements and initial concepts","year":"2018","author":"caldenhoven","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2017.10.016"},{"article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","year":"2010","author":"pfitzmann","key":"ref27"},{"article-title":"Operating platoons on public motorways: An introduction to the sartre platooning programme","year":"2010","author":"robinson","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2014.6856540"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108527"},{"journal-title":"Truck Platooning Driving the Future of Transportation","year":"2015","author":"janssen","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.3390\/electronics4030380","article-title":"Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures","volume":"4","author":"hamida","year":"2015","journal-title":"Electronics"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-45892-2_5","article-title":"Formal verification of the on-the-fly vehicle platooning protocol","author":"mallozzi","year":"2016","journal-title":"Software Engineering for Resilient Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.fluid.25.1.485"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1016\/j.vehcom.2014.05.001","article-title":"Survey on vanet security challenges and possible cryptographic solutions","volume":"1","author":"mejri","year":"2014","journal-title":"Vehicular Communications"},{"journal-title":"Statistical pocketbook 2018","year":"2018","key":"ref1"},{"journal-title":"Intelligent Transport Systems (ITS) Communications Architecture","year":"2010","key":"ref20"},{"journal-title":"ITS communications security architecture and security management","year":"2018","key":"ref22"},{"journal-title":"Intelligent Transport Systems (ITS) Security Security Services and Architecture","year":"2010","key":"ref21"},{"journal-title":"Certificate Policy for Deployment and Operation of European Cooperative Intelligent Transport Systems","year":"2017","key":"ref24"},{"journal-title":"Intelligent Transport Systems (ITS) Security Trust and Privacy Management","year":"2018","key":"ref23"},{"key":"ref26","article-title":"Technical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication","author":"ullmann","year":"2016","journal-title":"Fifth International Conference on Advances in Vehicular Systems"},{"journal-title":"Security policy & governance framework for deployment and operation of european cooperative intelligent transport systems (c-its)","year":"2017","key":"ref25"}],"event":{"name":"2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall)","start":{"date-parts":[[2019,9,22]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2019,9,25]]}},"container-title":["2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8888152\/8890973\/08891548.pdf?arnumber=8891548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:30:14Z","timestamp":1658158214000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8891548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/vtcfall.2019.8891548","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}