{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T00:07:12Z","timestamp":1756426032974,"version":"3.44.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/wimob.2010.5645013","type":"proceedings-article","created":{"date-parts":[[2010,12,9]],"date-time":"2010-12-09T10:34:18Z","timestamp":1291890858000},"page":"541-547","source":"Crossref","is-referenced-by-count":2,"title":["Secure compression of privacy-preserving witnesses in vehicular ad hoc networks"],"prefix":"10.1109","author":[{"given":"Bo","family":"Qin","sequence":"first","affiliation":[{"name":"Universitat Rovira i Virgili, Dept. of Comp. Eng. and Maths, UNESCO Chair in Data Privacy, Av. Pa&#x00EF;sos Catalans 26, E-43007 Tarragona, Catalonia, Spain"}]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[{"name":"Universitat Rovira i Virgili, Dept. of Comp. Eng. and Maths, UNESCO Chair in Data Privacy, Av. Pa&#x00EF;sos Catalans 26, E-43007 Tarragona, Catalonia, Spain"}]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Universitat Rovira i Virgili, Dept. of Comp. Eng. and Maths, UNESCO Chair in Data Privacy, Av. Pa&#x00EF;sos Catalans 26, E-43007 Tarragona, Catalonia, Spain"}]},{"given":"Josep","family":"Domingo-Ferrer","sequence":"additional","affiliation":[{"name":"Universitat Rovira i Virgili, Dept. of Comp. Eng. and Maths, UNESCO Chair in Data Privacy, Av. Pa&#x00EF;sos Catalans 26, E-43007 Tarragona, Catalonia, Spain"}]}],"member":"263","reference":[{"key":"19","first-page":"465","article-title":"Sequential aggregate signatures and multisignatures without random oracles","author":"lu","year":"2006","journal-title":"Eurocrypt'06"},{"key":"17","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","article-title":"Aggregate and verifiably encrypted signatures from bilinear maps","author":"boneh","year":"2003","journal-title":"CRYPTO 2003"},{"key":"18","first-page":"514","article-title":"Sequential aggregate signatures from trapdoor permutations","author":"lysyanskaya","year":"2004","journal-title":"Eurocrypt'04"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410053"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.278"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073371"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161076"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2034669"},{"key":"21","first-page":"153","article-title":"Asymmetric group key agreement","author":"wu","year":"2009","journal-title":"EUROCRY PT 2009"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02181-7_28"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.129"},{"key":"23","first-page":"514","article-title":"Short Signatures from the Weil Pairing","author":"boneh","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"24","first-page":"84","article-title":"Publicly verifiable privacypreserving group decryption","author":"qin","year":"2009","journal-title":"Proc of Inscrypt 2008"},{"key":"25","first-page":"337","article-title":"Identification of multiple invalid signatures in pairing based batched signatures","author":"matt","year":"2009","journal-title":"Proc of PKC'09"},{"key":"26","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/11761679_26","article-title":"Compact group signatures without random oracles","volume":"4004","author":"boyen","year":"2006","journal-title":"Advances in Cryptology - EUROCRYPT 2006"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"journal-title":"Car 2 Car Communication Consortium","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425238"},{"journal-title":"Dedicated Short Range Communications(DSRC)","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2007.37"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161077"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.928581"}],"event":{"name":"2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2010,10,11]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2010,10,13]]}},"container-title":["2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5637454\/5644846\/05645013.pdf?arnumber=5645013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:06:46Z","timestamp":1756404406000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5645013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wimob.2010.5645013","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}