{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T15:52:53Z","timestamp":1762271573774,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,19]],"date-time":"2011-09-19T00:00:00Z","timestamp":1316390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,19]]},"DOI":"10.1145\/2030613.2030635","type":"proceedings-article","created":{"date-parts":[[2011,9,20]],"date-time":"2011-09-20T13:50:16Z","timestamp":1316526616000},"page":"193-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["Flooding-resilient broadcast authentication for VANETs"],"prefix":"10.1145","author":[{"given":"Hsu-Chun","family":"Hsiao","sequence":"first","affiliation":[{"name":"CyLab\/Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Ahren","family":"Studer","sequence":"additional","affiliation":[{"name":"CyLab\/Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[{"name":"CyLab\/Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"CyLab\/Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Fan","family":"Bai","sequence":"additional","affiliation":[{"name":"General Motors Research, Detroit, MI, USA"}]},{"given":"Bhargav","family":"Bellur","sequence":"additional","affiliation":[{"name":"General Motors Research, Bangalore, India"}]},{"given":"Aravind","family":"Iyer","sequence":"additional","affiliation":[{"name":"General Motors Research, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2011,9,19]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"LEA-6 u-blox 6 GPS modules data sheet 2010.  LEA-6 u-blox 6 GPS modules data sheet 2010."},{"volume-title":"Proceedings of IEEE AutoNet","year":"2006","author":"BAI F.","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860033"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"volume-title":"Proceedings of IEEE INFOCOMM","year":"1999","author":"CANETTI R.","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298126.1298155"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287901"},{"volume-title":"Proceedings of NDSS","year":"2010","author":"FRANCILLON A.","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706183"},{"volume-title":"Proceedings of NDSS","year":"2004","author":"GUNTER C. A.","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1860058.1860060"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998440"},{"volume-title":"Proceedings of ESCAR","year":"2006","author":"HU Y.-C.","key":"e_1_3_2_2_13_1"},{"key":"e_1_3_2_2_14_1","first-page":"9","article-title":"A method for the construction of minimum-redundancy codes","volume":"40","author":"HUFFMAN D. A","year":"1952","journal-title":"Institute of Radio Engineers"},{"volume-title":"IEEE Standards","year":"2006","author":"IEEE","key":"e_1_3_2_2_15_1"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511485"},{"volume-title":"Proceedings of MESM","year":"2002","author":"DANIEL H.","key":"e_1_3_2_2_17_1"},{"volume-title":"Proceedings of NDSS","year":"2004","author":"KARLOF C.","key":"e_1_3_2_2_18_1"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.101"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_2_21_1","unstructured":"LAMPORT L. Constructing digital signatures from a one-way function. Tech. rep. October 1979.  LAMPORT L. Constructing digital signatures from a one-way function. Tech. rep. October 1979."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502129"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833639"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180364"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/99517.99566"},{"key":"e_1_3_2_2_26_1","unstructured":"MCCANNE S. FLOYD S. AND FALL K. ns2 (network simulator 2). http:\/\/www-nrg.ee.lbl.gov\/ns\/.  MCCANNE S. FLOYD S. AND FALL K. ns2 (network simulator 2). http:\/\/www-nrg.ee.lbl.gov\/ns\/."},{"volume-title":"Proceedings of CRYPTO","year":"1987","author":"MERKLE R. C.","key":"e_1_3_2_2_27_1"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537878_13"},{"volume-title":"Proceedings of NDSS","year":"2003","author":"PANNETRAT A.","key":"e_1_3_2_2_29_1"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"PERRIG A. CANETTI R. TYGAR J. D. AND SONG D. The TESLA broadcast authentication protocol. RSA CryptoBytes (2002).  PERRIG A. CANETTI R. TYGAR J. D. AND SONG D. The TESLA broadcast authentication protocol. RSA CryptoBytes (2002).","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"RAYA M. AND HUBAUX J.-P. Securing vehicular ad hoc networks. JCS-SASN (2007).   RAYA M. AND HUBAUX J.-P. Securing vehicular ad hoc networks. JCS-SASN (2007).","DOI":"10.3233\/JCS-2007-15103"},{"key":"e_1_3_2_2_33_1","first-page":"2","article-title":"Polynomial codes over certain finite fields","volume":"8","author":"REED I.","year":"1960","journal-title":"J. SIAM"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614269.1614291"},{"volume-title":"Proceedings of USENIX Security Symposium","year":"2010","author":"ROUF I.","key":"e_1_3_2_2_35_1"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741885"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"STUDER A. BAI F. BELLUR B. AND PERRIG A. Flexible extensible and efficient VANET authentication. Journal of Communications and Networks 11 6 (Dec. 2009) 574--588.  STUDER A. BAI F. BELLUR B. AND PERRIG A. Flexible extensible and efficient VANET authentication. Journal of Communications and Networks 11 6 (Dec. 2009) 574--588.","DOI":"10.1109\/JCN.2009.6388411"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288118"}],"event":{"name":"Mobicom'11: The 17th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Las Vegas Nevada USA","acronym":"Mobicom'11"},"container-title":["Proceedings of the 17th annual international conference on Mobile computing and networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030613.2030635","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2030613.2030635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:48Z","timestamp":1750240128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030613.2030635"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,19]]},"references-count":38,"alternative-id":["10.1145\/2030613.2030635","10.1145\/2030613"],"URL":"https:\/\/doi.org\/10.1145\/2030613.2030635","relation":{},"subject":[],"published":{"date-parts":[[2011,9,19]]},"assertion":[{"value":"2011-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}