{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:35Z","timestamp":1750306655445,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,4]],"date-time":"2014-08-04T00:00:00Z","timestamp":1407110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,4]]},"DOI":"10.1145\/2639968.2640059","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["VANET-based Secure Value-Added Services"],"prefix":"10.1145","author":[{"given":"Shi-Jinn","family":"Horng","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei 106, Taiwan"}]},{"given":"Shiang-Feng","family":"Tzeng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei 106, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2014,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Dedicated Short Range Communications (DSRC) Home. {Online}. Available: http:\/\/www.leearmstrong.com\/Dsrc\/DSRCHomeset.htm.  Dedicated Short Range Communications (DSRC) Home. {Online}. Available: http:\/\/www.leearmstrong.com\/Dsrc\/DSRCHomeset.htm."},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"39","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"Raya M.","year":"2007","unstructured":"M. Raya and J. P. Hubaux , \" Securing vehicular ad hoc networks ,\" Journal of computer Security -- Special Issue on Security of Ad-hoc and Sensor Network , vol. 15 , no. 1 , pp. 39 -- 68 , 2007 . M. Raya and J. P. Hubaux, \"Securing vehicular ad hoc networks,\" Journal of computer Security -- Special Issue on Security of Ad-hoc and Sensor Network, vol. 15, no. 1, pp. 39--68, 2007.","journal-title":"Journal of computer Security -- Special Issue on Security of Ad-hoc and Sensor Network"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.03.012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288128"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.877704"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.928581"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.05.010"},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"463","article-title":"Cryptanalysis of a PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks","volume":"6","author":"Wu W. C.","year":"2012","unstructured":"W. C. Wu and Y. M. Chen , \" Cryptanalysis of a PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks ,\" Applied Mathematics & Information Sciences , vol. 6 , no. 2 S, pp. 463 -- 469 , 2012 . W. C. Wu and Y. M. Chen, \"Cryptanalysis of a PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks,\" Applied Mathematics & Information Sciences, vol. 6, no. 2S, pp. 463--469, 2012.","journal-title":"Applied Mathematics & Information Sciences"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030105"},{"key":"e_1_3_2_1_12_1","first-page":"10","article-title":"Password authentication without the server public key","volume":"87","author":"Chang Y. F.","year":"2004","unstructured":"Y. F. Chang , C. C. Chang and Y. L. Liu , \" Password authentication without the server public key ,\" IEICE Transactions on Communications , vol. E87 -B, no. 10 , pp. 3088--3091, 2004 . Y. F. Chang, C. C. Chang and Y. L. Liu, \"Password authentication without the server public key,\" IEICE Transactions on Communications, vol. E87-B, no. 10, pp. 3088--3091, 2004.","journal-title":"IEICE Transactions on Communications"},{"key":"e_1_3_2_1_13_1","first-page":"13","volume-title":"A practical public key cryptosystem provably secure against adaptive chosen cipher attack,\" in Proceedings of advances in cryptology - Crypto'98","author":"Cramer R.","year":"1998","unstructured":"R. Cramer and V. Shoup , \" A practical public key cryptosystem provably secure against adaptive chosen cipher attack,\" in Proceedings of advances in cryptology - Crypto'98 , vol. 1998 , pp. 13 -- 25 , 1998 . R. Cramer and V. Shoup, \"A practical public key cryptosystem provably secure against adaptive chosen cipher attack,\" in Proceedings of advances in cryptology - Crypto'98, vol. 1998, pp. 13--25, 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2006.10.003"},{"volume-title":"B. Schneier, \"Applied cryptography protocols algorithms and source code in C,\"","year":"1996","key":"e_1_3_2_1_15_1","unstructured":"B. Schneier, \"Applied cryptography protocols algorithms and source code in C,\" Second Edition, John Wiley & Sons Inc ., 1996 . B. Schneier, \"Applied cryptography protocols algorithms and source code in C,\" Second Edition, John Wiley & Sons Inc., 1996."}],"event":{"name":"SocialCom '14: International Conference on Social Computing","acronym":"SocialCom '14","location":"Beijing China"},"container-title":["Proceedings of the 2014 International Conference on Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2639968.2640059","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2639968.2640059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:15Z","timestamp":1750229775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2639968.2640059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,4]]},"references-count":15,"alternative-id":["10.1145\/2639968.2640059","10.1145\/2639968"],"URL":"https:\/\/doi.org\/10.1145\/2639968.2640059","relation":{},"subject":[],"published":{"date-parts":[[2014,8,4]]},"assertion":[{"value":"2014-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}