{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:28Z","timestamp":1750308628734,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T00:00:00Z","timestamp":1340582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,25]]},"DOI":"10.1145\/2307888.2307912","type":"proceedings-article","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T13:31:21Z","timestamp":1340803881000},"page":"123-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks"],"prefix":"10.1145","author":[{"given":"Joseph","family":"Benin","sequence":"first","affiliation":[{"name":"U.S. Coast Guard Academy, New London, CT, USA"}]},{"given":"Julien","family":"Poumailloux","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Henry","family":"Owen","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Technologie de Compi\u00e8gne, Compi\u00e8gne, France"}]}],"member":"320","published-online":{"date-parts":[[2012,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860033"},{"key":"e_1_3_2_1_2_1","volume-title":"Unified pseudonym distribution in VANETs","author":"Benin J.","year":"2010","unstructured":"Benin , J. , Nowatkowski , M. and Owen , H . Unified pseudonym distribution in VANETs . 2010 . Benin, J., Nowatkowski, M. and Owen, H. Unified pseudonym distribution in VANETs. 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECon.2012.6196929"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_13"},{"key":"e_1_3_2_1_5_1","first-page":"4","volume":"160","author":"Standard","unstructured":"IEEE IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-channel Operation. IEEE Std 160 9. 4 - 2010 . IEEE IEEE Standard for Wireless Access in Vehicular Environments (WAVE)-Multi-channel Operation. IEEE Std 1609.4-2010.","journal-title":"Operation. IEEE Std"},{"key":"e_1_3_2_1_6_1","unstructured":"IEEE IEEE Standard Specifications for Public-Key Cryptography. IEEE Std 1363-2000.  IEEE IEEE Standard Specifications for Public-Key Cryptography. IEEE Std 1363-2000."},{"key":"e_1_3_2_1_7_1","unstructured":"IEEE IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) - Security Services for Applications and Management Messages. 2006.  IEEE IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) - Security Services for Applications and Management Messages. 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410050"},{"key":"e_1_3_2_1_9_1","volume-title":"Experimental Measurements and Modeling for Vehicle-to-Vehicle Dedicated Short Range Communication (DSRC) Wireless Channels","author":"Kukshya V.","year":"2006","unstructured":"Kukshya , V. and Krishnan , H . Experimental Measurements and Modeling for Vehicle-to-Vehicle Dedicated Short Range Communication (DSRC) Wireless Channels . 2006 . Kukshya, V. and Krishnan, H. Experimental Measurements and Modeling for Vehicle-to-Vehicle Dedicated Short Range Communication (DSRC) Wireless Channels. 2006."},{"key":"e_1_3_2_1_10_1","volume-title":"Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications","author":"Ma Z.","year":"2008","unstructured":"Ma , Z. , Kargl , F. and Weber , M . Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications . 2008 . Ma, Z., Kargl, F. and Weber, M. Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications. 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"-P. Secure Vehicular Communication Systems: Design and Architecture","author":"Papadimitratos P.","year":"2008","unstructured":"Papadimitratos , P. , Buttyan , L. , Holczer , T. , Schoch , E. , Freudiger , J. , Raya , M. , Ma , Z. , Kargl , F. , Kung , A. and Hubaux , J . -P. Secure Vehicular Communication Systems: Design and Architecture . 2008 . Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A. and Hubaux, J.-P. Secure Vehicular Communication Systems: Design and Architecture. 2008."},{"key":"e_1_3_2_1_12_1","volume-title":"Analysis of authentication overhead in vehicular networks","author":"Petit J.","year":"2010","unstructured":"Petit , J. and Mammeri , Z . Analysis of authentication overhead in vehicular networks . 2010 . Petit, J. and Mammeri, Z. Analysis of authentication overhead in vehicular networks. 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"Performance Comparison of VANET Routing Protocols","author":"Rani P.","year":"2011","unstructured":"Rani , P. , Sharma , N. and Singh , P. K . Performance Comparison of VANET Routing Protocols . 2011 . Rani, P., Sharma, N. and Singh, P. K. Performance Comparison of VANET Routing Protocols. 2011."},{"key":"e_1_3_2_1_14_1","volume-title":"Security Aspects of Inter-Vehicle Communications","author":"Raya M.","year":"2005","unstructured":"Raya , M. and Hubaux , J. P . Security Aspects of Inter-Vehicle Communications . 2005 . Raya, M. and Hubaux, J. P. Security Aspects of Inter-Vehicle Communications. 2005."},{"key":"e_1_3_2_1_15_1","volume-title":"Inter-Vehicle Communications: Assessing Information Dissemination Under Safety Constraints","author":"Torrent-Moreno M.","year":"2007","unstructured":"Torrent-Moreno , M. Inter-Vehicle Communications: Assessing Information Dissemination Under Safety Constraints . 2007 . Torrent-Moreno, M. Inter-Vehicle Communications: Assessing Information Dissemination Under Safety Constraints. 2007."}],"event":{"name":"MobiSys'12: The 10th International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Low Wood Bay Lake District UK","acronym":"MobiSys'12"},"container-title":["Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2307888.2307912","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2307888.2307912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:53Z","timestamp":1750273673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2307888.2307912"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,25]]},"references-count":15,"alternative-id":["10.1145\/2307888.2307912","10.1145\/2307888"],"URL":"https:\/\/doi.org\/10.1145\/2307888.2307912","relation":{},"subject":[],"published":{"date-parts":[[2012,6,25]]},"assertion":[{"value":"2012-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}