{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:13:02Z","timestamp":1759133582123,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/wimob.2013.6673437","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T19:45:04Z","timestamp":1386186304000},"page":"730-735","source":"Crossref","is-referenced-by-count":8,"title":["Privacy-aware route tracing and revocation games in VANET-based clouds"],"prefix":"10.1109","author":[{"given":"Rasheed","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Fizza","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Junngab","family":"Son","sequence":"additional","affiliation":[]},{"given":"Hasoo","family":"Eun","sequence":"additional","affiliation":[]},{"given":"Heekuck","family":"Oh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494200"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.129"},{"key":"16","first-page":"1","article-title":"Security challenges in vehicular cloud computing","author":"yan","year":"2012","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"13","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MWC.2009.5361178","article-title":"Providing location security in vehicular Ad Hoc networks","volume":"16","author":"gongjun","year":"2009","journal-title":"Wireless Communications IEEE"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2007.443"},{"key":"11","first-page":"417","article-title":"Use of elliptic curves in crytography","author":"miller","year":"1985","journal-title":"Proc Advances Cryptology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566744"},{"key":"2","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.2008.4481346","article-title":"Security in vehicular ad hoc networks","volume":"46","author":"lin","year":"2008","journal-title":"IEEE Communications Magazine"},{"key":"1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"Journal of Computer Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427481"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.4108\/icst.trans.mca.2011.e2"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10838-9_20"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2013.38"},{"key":"8","first-page":"44","article-title":"Dedicated short-range communications","author":"delgrossi","year":"2009","journal-title":"Vehicle Safety Communications Protocols Security and Privacy"}],"event":{"name":"2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2013,10,7]]},"location":"Lyon, France","end":{"date-parts":[[2013,10,9]]}},"container-title":["2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661476\/6673317\/06673437.pdf?arnumber=6673437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T12:17:44Z","timestamp":1564921064000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6673437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wimob.2013.6673437","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}