{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T23:49:07Z","timestamp":1747180147732,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/wivec.2014.6953258","type":"proceedings-article","created":{"date-parts":[[2014,11,25]],"date-time":"2014-11-25T17:34:27Z","timestamp":1416936867000},"page":"1-5","source":"Crossref","is-referenced-by-count":17,"title":["Revisiting attacker model for smart vehicles"],"prefix":"10.1109","author":[{"given":"Jonathan","family":"Petit","sequence":"first","affiliation":[]},{"given":"Michael","family":"Feiri","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2010.5437115"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2012.6407448"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737592"},{"key":"13","article-title":"Verifying mobility data under privacy considerations in car-to-x communication","author":"stubing","year":"2010","journal-title":"14th World Congress on ITS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s13177-011-0038-9"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301327"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2008.ECP.63"},{"key":"2","first-page":"5","article-title":"Securing vehicular communications-Assumptions, requirements, and principles","author":"papadimitratos","year":"2006","journal-title":"Workshop on Embedded Security in Cars (ESCAR)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"10","article-title":"Evil maid goes after truecrypt","author":"rutkowska","year":"2009","journal-title":"The Invisible Things Lab"},{"key":"7","first-page":"302","article-title":"Design, implementation, and evaluation of a vehicular hardware security module","volume":"7259","author":"wolf","year":"2011","journal-title":"Information Security and Cryptology (ICISC)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.79"},{"year":"0","key":"5"},{"key":"4","article-title":"Application distribution model and related security attacks in vanet","author":"nikaein","year":"2012","journal-title":"4th International Conference on Graphic and Image Processing (ICGIP)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"}],"event":{"name":"2014 IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC)","start":{"date-parts":[[2014,9,14]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2014,9,15]]}},"container-title":["2014 IEEE 6th International Symposium on Wireless Vehicular Communications (WiVeC 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6935107\/6953199\/06953258.pdf?arnumber=6953258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:17:50Z","timestamp":1490300270000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6953258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/wivec.2014.6953258","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}