{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:29:52Z","timestamp":1773235792024,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10]]},"DOI":"10.1145\/1023875.1023882","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"38-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Efficient attribute authentication with applications to ad hoc networks"],"prefix":"10.1145","author":[{"given":"Markus","family":"Jakobsson","sequence":"first","affiliation":[{"name":"Indiana University at Bloomington, Bloomington, IN"}]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ"}]}],"member":"320","published-online":{"date-parts":[[2004,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/525080.884248"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt03)","author":"Buchegger S.","year":"2003","unstructured":"S. Buchegger and J.Y. Le Boudec . The Effect of Rumor Spreading in Reputation Systems for Mobile Ad Hoc Networks . Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt03) , 2003 . S. Buchegger and J.Y. Le Boudec. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad Hoc Networks. Proceedings of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt03), 2003."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of Financial Cryptography","author":"Coppersmith D.","year":"2002","unstructured":"D. Coppersmith and M. Jakobsson . Almost Optimal Hash Sequence Traversal . Proceedings of Financial Cryptography , 2002 . D. Coppersmith and M. Jakobsson. Almost Optimal Hash Sequence Traversal. Proceedings of Financial Cryptography, 2002."},{"key":"e_1_3_2_1_4_1","unstructured":"FIPS PUB 180-1 Secure Hash Standard SHA-1. http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm.  FIPS PUB 180-1 Secure Hash Standard SHA-1. http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_20"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44875-6_24"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_21"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of IEEE Wireless Communications and Networking Conference (WCNC)","author":"Liu Y.","year":"2003","unstructured":"Y. Liu and Y.R. Yang . Reputation Propagation and Agreement in Mobile Ad Hoc Networks . Proceedings of IEEE Wireless Communications and Networking Conference (WCNC) , 2003 . Y. Liu and Y.R. Yang. Reputation Propagation and Agreement in Mobile Ad Hoc Networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), 2003."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of RSA'97 and U.S. Patent 5,666","author":"Micali S.","unstructured":"S. Micali . Efficient Certificate Revocation . Proceedings of RSA'97 and U.S. Patent 5,666 ,416. S. Micali. Efficient Certificate Revocation. Proceedings of RSA'97 and U.S. Patent 5,666,416."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006544522159"},{"key":"e_1_3_2_1_12_1","unstructured":"http:\/\/www.rfidjournal.com\/article\/articleview\/269\/1\/1\/.  http:\/\/www.rfidjournal.com\/article\/articleview\/269\/1\/1\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/192844.192905"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/223904.223931"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_32"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44875-6_16"}],"event":{"name":"Vanet04: Vehicular Ad-hoc Networks Workshop ( co-located with Mobicom 2004 Conference )","location":"Philadelphia PA USA","acronym":"Vanet04","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1023875.1023882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1023875.1023882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:23:53Z","timestamp":1750267433000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1023875.1023882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":16,"alternative-id":["10.1145\/1023875.1023882","10.1145\/1023875"],"URL":"https:\/\/doi.org\/10.1145\/1023875.1023882","relation":{},"subject":[],"published":{"date-parts":[[2004,10]]},"assertion":[{"value":"2004-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}