{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:36Z","timestamp":1750307256418,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T00:00:00Z","timestamp":1300752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,22]]},"DOI":"10.1145\/1966913.1966982","type":"proceedings-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T09:36:11Z","timestamp":1302168971000},"page":"471-475","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["<i>MLAS<\/i>"],"prefix":"10.1145","author":[{"given":"T. W.","family":"Chim","sequence":"first","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Lucas C. K.","family":"Hui","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Victor O. K.","family":"Li","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2011,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"SHA-3 Project by NIST. http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html.  SHA-3 Project by NIST. http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html."},{"volume-title":"Proceedings of the 12th Annual Network and Distributed Systems Security Symposium (NDSS)","year":"2005","author":"Ateniese G.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646037.678015"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717005"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSN.2008.4772697"},{"volume-title":"Li. SPECS: Secure and Privacy Enhancing Communications for VANET. In Proceedings of the ADHOCNETS '09","year":"2009","author":"Chim T. W.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"R. Housley W. Ford W. Polk and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF RFC2459 1999.  R. Housley W. Ford W. Polk and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF RFC2459 1999.","DOI":"10.17487\/rfc2459"},{"key":"e_1_3_2_1_8_1","first-page":"2223","volume-title":"Proceedings of the IEEE VTC '99","author":"Oh H.","year":"1999"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788857.1788861"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.84"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.282"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.281"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.58"}],"event":{"name":"ASIA CCS '11: 6th ACM Symposium on Information, Compuer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hong Kong China","acronym":"ASIA CCS '11"},"container-title":["Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1966913.1966982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:25Z","timestamp":1750243945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966982"}},"subtitle":["multiple level authentication scheme for VANETs"],"short-title":[],"issued":{"date-parts":[[2011,3,22]]},"references-count":13,"alternative-id":["10.1145\/1966913.1966982","10.1145\/1966913"],"URL":"https:\/\/doi.org\/10.1145\/1966913.1966982","relation":{},"subject":[],"published":{"date-parts":[[2011,3,22]]},"assertion":[{"value":"2011-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}