{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:32Z","timestamp":1750306592544,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,6]],"date-time":"2015-05-06T00:00:00Z","timestamp":1430870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,6]]},"DOI":"10.1145\/2742854.2745718","type":"proceedings-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T16:31:04Z","timestamp":1431361864000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Authentication and privacy preserving message transfer scheme for vehicular ad hoc networks (VANETs)"],"prefix":"10.1145","author":[{"given":"Kuldeep","family":"Singh","sequence":"first","affiliation":[{"name":"Panjab University, Chandigarh, India"}]},{"given":"Poonam","family":"Saini","sequence":"additional","affiliation":[{"name":"PEC University of Technology, Chandigarh, India"}]},{"given":"Sudesh","family":"Rani","sequence":"additional","affiliation":[{"name":"PEC University of Technology, Chandigarh, India"}]},{"given":"Awadhesh Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Kurukshetra, India"}]}],"member":"320","published-online":{"date-parts":[[2015,5,6]]},"reference":[{"volume-title":"7th International Workshop on Systems, Signal Processing and their Applications, (May 2011), 247--250, WOSSPA'11.","author":"Amara Moncef","key":"e_1_3_2_1_1_1","unstructured":"Amara , Moncef , and Amar Siad . Elliptic Curve Cryptography and its applications . In 7th International Workshop on Systems, Signal Processing and their Applications, (May 2011), 247--250, WOSSPA'11. Amara, Moncef, and Amar Siad. Elliptic Curve Cryptography and its applications. In 7th International Workshop on Systems, Signal Processing and their Applications, (May 2011), 247--250, WOSSPA'11."},{"volume-title":"Zurina Mohd Hanapi. Comparison of ECC and RSA Algorithm in Resource Constrained Devices. In IEEE International Conference on IT Convergence and Security, (Nov 2013), 1--3, ICITCS'13.","author":"Bafandehkar Mohsen","key":"e_1_3_2_1_2_1","unstructured":"Bafandehkar , Mohsen , Sharifah Md Yasin , Ramlan Mahmod , and Zurina Mohd Hanapi. Comparison of ECC and RSA Algorithm in Resource Constrained Devices. In IEEE International Conference on IT Convergence and Security, (Nov 2013), 1--3, ICITCS'13. Bafandehkar, Mohsen, Sharifah Md Yasin, Ramlan Mahmod, and Zurina Mohd Hanapi. Comparison of ECC and RSA Algorithm in Resource Constrained Devices. In IEEE International Conference on IT Convergence and Security, (Nov 2013), 1--3, ICITCS'13."},{"volume-title":"Applied Cryptography: Protocols, Algorithms and Source code in C","author":"Bruce Schneier","key":"e_1_3_2_1_3_1","unstructured":"Bruce Schneier . Applied Cryptography: Protocols, Algorithms and Source code in C . John Wiley and Sons . Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source code in C. John Wiley and Sons."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/TVT.2013.2257188","volume":"62","author":"Lin Xiaodong","year":"2013","unstructured":"Lin , Xiaodong , and Xu Li . Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology , 62 , 7 ( September 2013 ), 3339--3348. Lin, Xiaodong, and Xu Li. Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 62, 7 (September 2013), 3339--3348.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.259647"},{"volume-title":"Fourth IEEE International Conference on Computing, Communications and Networking Technologies, 1--6, ICCCNT'13","author":"Ravi Kalkundri","key":"e_1_3_2_1_6_1","unstructured":"Ravi , Kalkundri , and S. A. Kulkarni . A secure message authentication scheme for VANET using ECDSA . In Fourth IEEE International Conference on Computing, Communications and Networking Technologies, 1--6, ICCCNT'13 . Ravi, Kalkundri, and S. A. Kulkarni. A secure message authentication scheme for VANET using ECDSA. In Fourth IEEE International Conference on Computing, Communications and Networking Technologies, 1--6, ICCCNT'13."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370616.1370618"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.188"},{"volume-title":"IEEE International Conference on Communications, 1451--1457, (May 2008), ICC'08.","key":"e_1_3_2_1_9_1","unstructured":"C. Zhang et. al. RAISE : an efficient RSU-aided message authentication scheme in vehicular communication networks . In IEEE International Conference on Communications, 1451--1457, (May 2008), ICC'08. C. Zhang et. al. RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In IEEE International Conference on Communications, 1451--1457, (May 2008), ICC'08."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2294032"},{"key":"e_1_3_2_1_11_1","first-page":"2014","year":"2013","unstructured":"IEEE 1609 - Family of Standards for Wireless Access in Vehicular Environments (WAVE). U.S. Department of Transportation. April 13, 2013 . Retrieved 2014 - 2011 -14. IEEE 1609 - Family of Standards for Wireless Access in Vehicular Environments (WAVE). U.S. Department of Transportation. April 13, 2013. Retrieved 2014-11-14.","journal-title":"Department of Transportation."},{"key":"e_1_3_2_1_12_1","unstructured":"http:\/\/www.cryptopp.com\/benchmarks.html  http:\/\/www.cryptopp.com\/benchmarks.html"},{"key":"e_1_3_2_1_13_1","unstructured":"National Security Agency. \"The Case for Elliptic Curve Cryptography\" (nsa.gov) {online} Jan 15 2009 http:\/\/www.nsa.gov\/business\/programs\/elliptic_curve.shtml  National Security Agency. \"The Case for Elliptic Curve Cryptography\" (nsa.gov) {online} Jan 15 2009 http:\/\/www.nsa.gov\/business\/programs\/elliptic_curve.shtml"}],"event":{"name":"CF'15: Computing Frontiers Conference","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Ischia Italy","acronym":"CF'15"},"container-title":["Proceedings of the 12th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742854.2745718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2742854.2745718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:34Z","timestamp":1750227394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742854.2745718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,6]]},"references-count":13,"alternative-id":["10.1145\/2742854.2745718","10.1145\/2742854"],"URL":"https:\/\/doi.org\/10.1145\/2742854.2745718","relation":{},"subject":[],"published":{"date-parts":[[2015,5,6]]},"assertion":[{"value":"2015-05-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}