{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T05:22:38Z","timestamp":1745212958370},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/vtcspring.2015.7146029","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T17:29:42Z","timestamp":1436203782000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET"],"prefix":"10.1109","author":[{"given":"Michael","family":"Feiri","sequence":"first","affiliation":[]},{"given":"Rolf","family":"Pielage","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Petit","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Privacy and identity management for vehicular communication systems: a position paper","author":"papadimitratos","year":"2006","journal-title":"Proceedings of Workshop on Standards for Privacy in User-Centric Identity Management"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.63"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-46088-8_15","article-title":"Provably secure implicit certificate schemes","author":"brown","year":"2002","journal-title":"Financial Cryptography"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410062"},{"key":"ref15","article-title":"Pseudonym schemes in vehicular networks: A survey","author":"petit","year":"2014","journal-title":"Communications Surveys Tutorials"},{"key":"ref16","article-title":"Verifying mobility data under privacy considerations in Car-to-X communication","author":"stubing","year":"2010","journal-title":"17th ITS World Congr"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2010.5437115"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2012.6407448"},{"key":"ref19","first-page":"194","article-title":"Protecting location privacy through path confusion","author":"hoh","year":"2005","journal-title":"Proceedings of 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks IEEE"},{"journal-title":"Intelligent Transport Systems (ITS) Vehicular Communications Basic Set of Applications Part 2 Specification of Cooperative Awareness Basic Service","year":"2013","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741885"},{"journal-title":"DSRC Implementation Guide A Guide to Users of SAE J2735 Message Sets Over DSRC","year":"2010","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.58"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3851"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737599"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2012.6407417"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161083"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2015"},{"journal-title":"IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages","year":"2013","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/586111.586114"},{"journal-title":"Intelligent Transport Systems (ITS) Security Security Services and Architecture","year":"2010","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2010.5698239"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737592"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2013.6549052"},{"key":"ref23","article-title":"Mix-Zones for Location Privacy in Vehicular Networks","author":"freudiger","year":"2007","journal-title":"Workshop on Wireless Networking for Intell Transp Syst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161084"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1201\/9780203323687.ch19"}],"event":{"name":"2015 IEEE 81st Vehicular Technology Conference (VTC Spring)","start":{"date-parts":[[2015,5,11]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2015,5,14]]}},"container-title":["2015 IEEE 81st Vehicular Technology Conference (VTC Spring)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7145358\/7145573\/07146029.pdf?arnumber=7146029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T11:12:48Z","timestamp":1498216368000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7146029\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/vtcspring.2015.7146029","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}