{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:15:29Z","timestamp":1773324929617,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,10]],"date-time":"2007-09-10T00:00:00Z","timestamp":1189382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,10]]},"DOI":"10.1145\/1287748.1287752","type":"proceedings-article","created":{"date-parts":[[2007,9,26]],"date-time":"2007-09-26T17:32:33Z","timestamp":1190827953000},"page":"19-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":370,"title":["Efficient and robust pseudonymous authentication in VANET"],"prefix":"10.1145","author":[{"given":"Giorgio","family":"Calandriello","sequence":"first","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]},{"given":"Panos","family":"Papadimitratos","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]}],"member":"320","published-online":{"date-parts":[[2007,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The CVIS project http:\/\/www.cvisproject.org\/.  The CVIS project http:\/\/www.cvisproject.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"DSRC\n  : Dedicated short range communications. http:\/\/grouper.ieee.org\/groups\/scc32\/dsrc\/index.html.  DSRC: Dedicated short range communications. http:\/\/grouper.ieee.org\/groups\/scc32\/dsrc\/index.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Openssl. http:\/\/www.openssl.org.  Openssl. http:\/\/www.openssl.org."},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE standard specifications for public-key cryptography- amendment 1: Additional techniques","author":"IEEE","year":"2004","unstructured":"IEEE 1363a 2004. IEEE standard specifications for public-key cryptography- amendment 1: Additional techniques , 2004 . IEEE 1363a 2004. IEEE standard specifications for public-key cryptography- amendment 1: Additional techniques, 2004."},{"key":"e_1_3_2_1_5_1","volume-title":"3nd International Workshop on Intelligent Transportation.","author":"Aijaz A.","unstructured":"A. Aijaz , B. Bochow , F. Dotzer , A. Festag , Matthias Gerlach , Rainer Kroh , and Tim Leinmuuller . Attacks on intervehicle communication systems -- an analysis . In 3nd International Workshop on Intelligent Transportation. A. Aijaz, B. Bochow, F. Dotzer, A. Festag, Matthias Gerlach, Rainer Kroh, and Tim Leinmuuller. Attacks on intervehicle communication systems -- an analysis. In 3nd International Workshop on Intelligent Transportation."},{"key":"e_1_3_2_1_6_1","volume-title":"WMAN 2007","author":"Armknecht F.","year":"2007","unstructured":"F. Armknecht , A. Festag , D. Westhoff , and K. Zeng . Cross-layer privacy enhancement and non-repudiation in vehicular communication . In WMAN 2007 , Bern , March 2007 . F. Armknecht, A. Festag, D. Westhoff, and K. Zeng. Cross-layer privacy enhancement and non-repudiation in vehicular communication. In WMAN 2007, Bern, March 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/314500.314964"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1007\/3-540-39200-9_38","volume-title":"Advances in cryptology -- EUROCRYPT","author":"Bellare M.","year":"2003","unstructured":"M. Bellare , D. Micciancio , and B. Warinschi . Foundations of group signatures: formal definition, simplified requirements and a construction based on trapdoor permutations . In Eli Biham, editor, Advances in cryptology -- EUROCRYPT 2003 , volume 2656 of Lecture Notes in Computer Science , pages 614 -- 629 , Warsaw, Poland, May 2003. Springer-Verlag . M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: formal definition, simplified requirements and a construction based on trapdoor permutations. In Eli Biham, editor, Advances in cryptology -- EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 614--629, Warsaw, Poland, May 2003. Springer-Verlag."},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science","volume-title":"CT-RSA'05","author":"Bellare M.","year":"2004","unstructured":"M. Bellare , H. Shi , and C. Zhang . Foundations of group signatures: The case of dynamic groups . In CT-RSA'05 , Lecture Notes in Computer Science , Springer-Verlag , 2004 . M. Bellare, H. Shi, and C. Zhang. Foundations of group signatures: The case of dynamic groups. In CT-RSA'05, Lecture Notes in Computer Science, Springer-Verlag, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.1265539"},{"key":"e_1_3_2_1_11_1","volume-title":"Short group signatures","author":"Boneh D.","year":"2004","unstructured":"D. Boneh , X. Boyen , and H. Shacham . Short group signatures , 2004 . D. Boneh, X. Boyen, and H. Shacham. Short group signatures, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_1_14_1","first-page":"250","volume-title":"CT-RSA","author":"Brown M.","year":"2001","unstructured":"M. Brown , D. Hankerson , J. Lopez , and A. Menezes . Software implementation of the nist elliptic curves over prime fields . In CT-RSA 2001 , pages 250 -- 265 , London, UK. Springer-Verlag . M. Brown, D. Hankerson, J. Lopez, and A. Menezes. Software implementation of the nist elliptic curves over prime fields. In CT-RSA 2001, pages 250--265, London, UK. Springer-Verlag."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754868.1754897"},{"key":"e_1_3_2_1_17_1","volume-title":"V2VCOM","author":"Gerlach M.","year":"2005","unstructured":"M. Gerlach . VaneSe -- an approach to vanet security. In V2VCOM 2005 , San Diego , California, USA , 2005. M. Gerlach. VaneSe -- an approach to vanet security. In V2VCOM 2005, San Diego, California, USA, 2005."},{"key":"e_1_3_2_1_18_1","volume-title":"WIT","author":"Gerlach M.","year":"2005","unstructured":"M. Gerlach , A. Festag , T. Leinmuller , G. Goldacker , and C. Harsch . Security architecture for vehicular communication . In WIT 2005 , Hamburg, Germany. M. Gerlach, A. Festag, T. Leinmuller, G. Goldacker, and C. Harsch. Security architecture for vehicular communication. In WIT 2005, Hamburg, Germany."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"e_1_3_2_1_20_1","volume-title":"July","year":"2006","unstructured":"IEEE1609.2. IEEE trial-use standard for wireless access in vehicular environments -- security services for applications and management messages , July 2006 . IEEE1609.2. IEEE trial-use standard for wireless access in vehicular environments -- security services for applications and management messages, July 2006."},{"key":"e_1_3_2_1_21_1","volume-title":"VTC-Fall","author":"Jakobsson M.","year":"2004","unstructured":"M. Jakobsson , X. Wang , and S. Wetzel . Stealth attacks in vehicular technologies . In VTC-Fall 2004 . M. Jakobsson, X. Wang, and S. Wetzel. Stealth attacks in vehicular technologies. In VTC-Fall 2004."},{"key":"e_1_3_2_1_23_1","volume-title":"ESCAR","author":"Laberteaux K.","year":"2006","unstructured":"K. Laberteaux and Y.- C. Hu . Strong vanet security on a budget . In ESCAR 2006 . K. Laberteaux and Y.-C.Hu. Strong vanet security on a budget. In ESCAR 2006."},{"key":"e_1_3_2_1_24_1","volume-title":"ESCAR","author":"Li M.","year":"2005","unstructured":"M. Li , R. Poovendran , K. Sampigethaya , and L. Huang . Caravan: Providing location privacy for vanet . In ESCAR 2005 . M. Li, R. Poovendran, K. Sampigethaya, and L. Huang. Caravan: Providing location privacy for vanet. In ESCAR 2005."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/B978-0-08-009306-2.50005-4","volume-title":"Statistical methods in radio wave propagation","author":"Nakagami M.","year":"1960","unstructured":"M. Nakagami . The m-distribution, a general formula of intensity distribution of the rapid fading . In W. G. Hoffman, editor, Statistical methods in radio wave propagation , pages 3 -- 36 , Oxford, 1960 . Pergamon . M. Nakagami. The m-distribution, a general formula of intensity distribution of the rapid fading. In W. G. Hoffman, editor, Statistical methods in radio wave propagation, pages 3--36, Oxford, 1960. Pergamon."},{"key":"e_1_3_2_1_26_1","volume-title":"ITST'07","author":"Papadimitratos P.","unstructured":"P. Papadimitratos , L. Buttyan , J-P. Hubaux , F. Kargl , A. Kung , and M. Raya . Architecture for secure and private vehicular communications . In ITST'07 , Sophia Antipolis, France. P. Papadimitratos, L. Buttyan, J-P. Hubaux, F. Kargl, A. Kung, and M. Raya. Architecture for secure and private vehicular communications. In ITST'07, Sophia Antipolis, France."},{"key":"e_1_3_2_1_27_1","volume-title":"ESCAR","author":"Papadimitratos P.","year":"2006","unstructured":"P. Papadimitratos , V. Gligor , and J.-P. Hubaux . Securing Vehicular Communications -- Assumptions, Requirements, and Principles . In ESCAR 2006 . P. Papadimitratos, V. Gligor, and J.-P. Hubaux. Securing Vehicular Communications -- Assumptions, Requirements, and Principles. In ESCAR 2006."},{"key":"e_1_3_2_1_28_1","volume-title":"HotNets-IV","author":"Parno B.","year":"2005","unstructured":"B. Parno and A. Perrig . Challenges in securing vehicular networks . In HotNets-IV , 2005 . B. Parno and A.Perrig. Challenges in securing vehicular networks. In HotNets-IV, 2005."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250352"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647544.730472"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1164717.1164731"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023878"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288504"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023879"},{"key":"e_1_3_2_1_36_1","unstructured":"M. El Zarki S. Mehrotra G. Tsudik and N. Venkatasubramanian. Security issues in a future vehicular network.  M. El Zarki S. Mehrotra G. Tsudik and N. Venkatasubramanian. Security issues in a future vehicular network."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11774716_17"}],"event":{"name":"MobiCom\/MobiHoc '07: The Thirteenth Annual International Conference on Mobile Computing and Networking and The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Montreal Quebec Canada","acronym":"MobiCom\/MobiHoc '07","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1287748.1287752","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1287748.1287752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:31Z","timestamp":1750278151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1287748.1287752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,10]]},"references-count":36,"alternative-id":["10.1145\/1287748.1287752","10.1145\/1287748"],"URL":"https:\/\/doi.org\/10.1145\/1287748.1287752","relation":{},"subject":[],"published":{"date-parts":[[2007,9,10]]},"assertion":[{"value":"2007-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}