{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T20:20:38Z","timestamp":1778617238920,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3242102.3242125","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"241-248","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Vouch"],"prefix":"10.1145","author":[{"given":"Felipe","family":"Boeira","sequence":"first","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}]},{"given":"Mikael","family":"Asplund","sequence":"additional","affiliation":[{"name":"Link\u00f6ping University, Link\u00f6ping, Sweden"}]},{"given":"Marinho P.","family":"Barcellos","sequence":"additional","affiliation":[{"name":"Universidade Federal do Rio Grande do Sul, Porto Alegre, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2017 IEEE Vehicular Networking Conference (VNC) . 53--60","author":"Boeira F.","unstructured":"F. Boeira , M. P. Barcellos , E. P. de Freitas , A. Vinel , and M. Asplund . 2017. Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning . In 2017 IEEE Vehicular Networking Conference (VNC) . 53--60 . F. Boeira, M. P. Barcellos, E. P. de Freitas, A. Vinel, and M. Asplund. 2017. Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning. In 2017 IEEE Vehicular Networking Conference (VNC) . 53--60."},{"key":"e_1_3_2_1_2_1","volume-title":"Security and Privacy in the Age of Ubiquitous Computing","author":"Bussard Laurent","unstructured":"Laurent Bussard and Walid Bagga . 2005. Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks . In Security and Privacy in the Age of Ubiquitous Computing , Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, and Hiroshi Yoshiura (Eds.). Springer US , 223--238. Laurent Bussard and Walid Bagga. 2005. Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks. In Security and Privacy in the Age of Ubiquitous Computing, Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, and Hiroshi Yoshiura (Eds.). Springer US, 223--238."},{"key":"e_1_3_2_1_3_1","volume-title":"Lectures on Data Security, Modern Cryptology in Theory and Practice","author":"Damg\u00e5rd Ivan","year":"1998","unstructured":"Ivan Damg\u00e5rd . 1999. Commitment Schemes and Zero-Knowledge Protocols . In Lectures on Data Security, Modern Cryptology in Theory and Practice , Summer School, Aarhus, Denmark , July 1998 . Springer-Verlag , 63--86. Ivan Damg\u00e5rd. 1999. Commitment Schemes and Zero-Knowledge Protocols. In Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998 . Springer-Verlag, 63--86."},{"key":"e_1_3_2_1_4_1","unstructured":"Joerie de Gram. 2011. Speeding up EC cryptography on embedded hardware. (2011).  Joerie de Gram. 2011. Speeding up EC cryptography on embedded hardware. (2011)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.024"},{"key":"e_1_3_2_1_6_1","volume-title":"Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS '01)","author":"Douceur John R.","unstructured":"John R. Douceur . 2002. The Sybil Attack . In Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS '01) . Springer-Verlag , 251--260. John R. Douceur. 2002. The Sybil Attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS '01). Springer-Verlag, 251--260."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250792"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706019"},{"key":"e_1_3_2_1_9_1","volume-title":"Where have you been? secure location provenance for mobile devices. arXiv preprint arXiv:1107.1821","author":"Hasan Ragib","year":"2011","unstructured":"Ragib Hasan and Randal Burns . 2011. Where have you been? secure location provenance for mobile devices. arXiv preprint arXiv:1107.1821 ( 2011 ). Ragib Hasan and Randal Burns. 2011. Where have you been? secure location provenance for mobile devices. arXiv preprint arXiv:1107.1821 (2011)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2401394"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.061411.00019"},{"key":"e_1_3_2_1_12_1","volume-title":"2015 IEEE 81st Vehicular Technology Conference (VTC Spring). 1--6.","author":"Kela P.","unstructured":"P. Kela , M. Costa , J. Salmi , K. Leppanen , J. Turkka , T. Hiltunen , and M. Hronec . 2015a. A Novel Radio Frame Structure for 5G Dense Outdoor Radio Access Networks . In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring). 1--6. P. Kela, M. Costa, J. Salmi, K. Leppanen, J. Turkka, T. Hiltunen, and M. Hronec. 2015a. A Novel Radio Frame Structure for 5G Dense Outdoor Radio Access Networks. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring). 1--6."},{"key":"e_1_3_2_1_13_1","volume-title":"2016 IEEE 84th Vehicular Technology Conference (VTC-Fall). 1--7.","author":"Kela P.","unstructured":"P. Kela , M. Costa , J. Turkka , M. Koivisto , J. Werner , A. Hakkarainen , M. Valkama , R. Jantti , and K. Leppanen . 2016. Location Based Beamforming in 5G Ultra-Dense Networks . In 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall). 1--7. P. Kela, M. Costa, J. Turkka, M. Koivisto, J. Werner, A. Hakkarainen, M. Valkama, R. Jantti, and K. Leppanen. 2016. Location Based Beamforming in 5G Ultra-Dense Networks. In 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall). 1--7."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2470532"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590339"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4271\/2014-01-2438"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869797"},{"key":"e_1_3_2_1_18_1","volume-title":"2015 IEEE International Symposium on Intelligent Control (ISIC). 683--687","author":"Ma M.","unstructured":"M. Ma , J. An , Z. Huang , and Z. Cao . 2015. Sensor data fusion based on an improved dempaster-shafer evidence theory in vehicular cyber-physical systems . In 2015 IEEE International Symposium on Intelligent Control (ISIC). 683--687 . M. Ma, J. An, Z. Huang, and Z. Cao. 2015. Sensor data fusion based on an improved dempaster-shafer evidence theory in vehicular cyber-physical systems. In 2015 IEEE International Symposium on Intelligent Control (ISIC). 683--687."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.02.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218490"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5395778"},{"key":"e_1_3_2_1_22_1","volume-title":"2008 11th International Conference on Information Fusion. 1--6.","author":"Schubert R.","unstructured":"R. Schubert , E. Richter , and G. Wanielik . 2008. Comparison and evaluation of advanced motion models for vehicle tracking . In 2008 11th International Conference on Information Fusion. 1--6. R. Schubert, E. Richter, and G. Wanielik. 2008. Comparison and evaluation of advanced motion models for vehicle tracking. In 2008 11th International Conference on Information Fusion. 1--6."},{"key":"e_1_3_2_1_23_1","volume-title":"PLEXE: A Platooning Extension for Veins. In 6th IEEE Vehicular Networking Conference (VNC","author":"Segata Michele","year":"2014","unstructured":"Michele Segata , Stefan Joerer , Bastian Bloessl , Christoph Sommer , Falko Dressler , and Renato Lo Cigno . 2014 . PLEXE: A Platooning Extension for Veins. In 6th IEEE Vehicular Networking Conference (VNC 2014). IEEE, 53--60. Michele Segata, Stefan Joerer, Bastian Bloessl, Christoph Sommer, Falko Dressler, and Renato Lo Cigno. 2014. PLEXE: A Platooning Extension for Veins. In 6th IEEE Vehicular Networking Conference (VNC 2014). IEEE, 53--60."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.133"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2362752"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2515119"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600374"},{"key":"e_1_3_2_1_29_1","volume-title":"2011 Proceedings IEEE INFOCOM . 1889--1897","author":"Zhu Z.","unstructured":"Z. Zhu and G. Cao . 2011. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services . In 2011 Proceedings IEEE INFOCOM . 1889--1897 . Z. Zhu and G. Cao. 2011. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services. In 2011 Proceedings IEEE INFOCOM . 1889--1897."}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","location":"Montreal QC Canada","acronym":"MSWIM '18","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242102.3242125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:36Z","timestamp":1750207416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242125"}},"subtitle":["A Secure Proof-of-Location Scheme for VANETs"],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":28,"alternative-id":["10.1145\/3242102.3242125","10.1145\/3242102"],"URL":"https:\/\/doi.org\/10.1145\/3242102.3242125","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}