{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:28:03Z","timestamp":1775312883211,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research at King Saud University through the Research Group","doi-asserted-by":"publisher","award":["RG-1439-022"],"award-info":[{"award-number":["RG-1439-022"]}],"id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia (FCT)\/Minist\u00e9rio da Ci\u00eancia, Tecnologia e ensino Superior (MCTES) through the National Funds","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EU funds","award":["UIDB\/50008\/2020"],"award-info":[{"award-number":["UIDB\/50008\/2020"]}]},{"DOI":"10.13039\/501100003593","name":"Brazilian National Council for Research and Development","doi-asserted-by":"publisher","award":["313036\/2020-9"],"award-info":[{"award-number":["313036\/2020-9"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/tits.2021.3066487","type":"journal-article","created":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T19:42:32Z","timestamp":1616787752000},"page":"3869-3879","source":"Crossref","is-referenced-by-count":22,"title":["Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications"],"prefix":"10.1109","volume":"22","author":[{"given":"Junaid Ahsenali","family":"Chaudhry","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8062-3301","authenticated-orcid":false,"given":"Kashif","family":"Saleem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1928-3704","authenticated-orcid":false,"given":"Mamoun","family":"Alazab","sequence":"additional","affiliation":[]},{"given":"Hafiz Maher Ali","family":"Zeeshan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0246-2148","authenticated-orcid":false,"given":"Jalal","family":"Al-Muhtadi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600541CM"},{"key":"ref38","author":"box","year":"2015","journal-title":"Time Series Analysis Forecasting and Control"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.1989.37448"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2723570"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403559"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1728303"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2752798"},{"key":"ref36","first-page":"1","article-title":"IEEE PHD cybersecurity standards roadmap","author":"fischer","year":"2019","journal-title":"Proc IEEE PHD CyberSecur Standards Roadmap"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080507"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"ref60","first-page":"220","article-title":"Discovering trends for the development of novel authentication applications for dementia patients","author":"chaudhry","year":"2017","journal-title":"Proc Int Conf Appl Techn Cyber Secur Intell"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPIS48135.2019.9045898"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2013.6488581"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805919"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.02.047"},{"key":"ref1","article-title":"Healthcare and public health sector-specific plan","author":"secutity","year":"2016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2015.7454499"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_10"},{"key":"ref24","first-page":"285","article-title":"A fair and robust voting system by broadcast","author":"khader","year":"2012","journal-title":"Proc Gesellschaft Inf"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2008.0127"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.Workshops.2017.73"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7513863"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.13"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129516000104"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013797"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991067"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102080"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422401"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.28"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2645559"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427481"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2702388"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.055"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2016.7749423"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34475-6_52"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISMICT.2018.8573695"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3225"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313355"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720912958"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.1.37"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.56"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1109\/NTPE.2017.9778026","article-title":"Internet of threats and context aware security: Part two","author":"chaudhry","year":"2017"},{"key":"ref3","article-title":"Internet security threat report","author":"o\u2019gorman","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2841987"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2016086"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.011732"},{"key":"ref7","first-page":"549","author":"williams","year":"2020","journal-title":"Beyond 2000 The Rise of Australian Cyber Warfare Capability"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2939221"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2929741"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600213NM"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.9"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7839768"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.27"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2580623"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2973314"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/9444590\/09387630.pdf?arnumber=9387630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T15:54:03Z","timestamp":1671724443000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9387630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":60,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tits.2021.3066487","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]}}}