{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:50:12Z","timestamp":1764784212682,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swedish Foundation for Strategic Research","award":["RIT17-0005"],"award-info":[{"award-number":["RIT17-0005"]}]},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","award":["2013.0242"],"award-info":[{"award-number":["2013.0242"]}],"id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323410","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"174-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Scaling pseudonymous authentication for large mobile systems"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Khodaei","sequence":"first","affiliation":[{"name":"Networked Systems Security Group, Stockholm, Sweden"}]},{"given":"Hamid","family":"Noroozi","sequence":"additional","affiliation":[{"name":"Networked Systems Security Group, Stockholm, Sweden"}]},{"given":"Panos","family":"Papadimitratos","sequence":"additional","affiliation":[{"name":"Networked Systems Security Group, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"014","article-title":"V2V Communications: Readiness of V2V Technology for Application. National Highway Traffic Safety Administration","volume":"812","year":"2014","journal-title":"DOT HS"},{"key":"e_1_3_2_1_2_1","unstructured":"2016. Vehicle Safety Communications Security Studies: Technical Design of the Security Credential Management System. https:\/\/bit.ly\/2CA1WbV.  2016. Vehicle Safety Communications Security Studies: Technical Design of the Security Credential Management System. https:\/\/bit.ly\/2CA1WbV."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. AWS Certificate Manager. https:\/\/aws.amazon.com\/certificate-manager\/.  2018. AWS Certificate Manager. https:\/\/aws.amazon.com\/certificate-manager\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. AWS CloudTrail. https:\/\/aws.amazon.com\/cloudtrail\/.  2018. AWS CloudTrail. https:\/\/aws.amazon.com\/cloudtrail\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Cloud Identity & Access Management. https:\/\/cloud.google.com\/iam\/.  2018. Cloud Identity & Access Management. https:\/\/cloud.google.com\/iam\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. Comodo Certification Authority. https:\/\/ssl.comodo.com\/.  2018. Comodo Certification Authority. https:\/\/ssl.comodo.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. FIPS 140-2 Level 3 Non-Proprietary Security Policy. https:\/\/bit.ly\/2R1XUhE.  2018. FIPS 140-2 Level 3 Non-Proprietary Security Policy. https:\/\/bit.ly\/2R1XUhE."},{"key":"e_1_3_2_1_8_1","unstructured":"2018. GCP Cloud Audit Logging. https:\/\/cloud.google.com\/logging\/docs\/audit\/.  2018. GCP Cloud Audit Logging. https:\/\/cloud.google.com\/logging\/docs\/audit\/."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. Google Container Registry. https:\/\/cloud.google.com\/container-registry\/.  2018. Google Container Registry. https:\/\/cloud.google.com\/container-registry\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2018. Google Kubernetes Engine v1.9.6. https:\/\/bit.ly\/2I8MjJx.  2018. Google Kubernetes Engine v1.9.6. https:\/\/bit.ly\/2I8MjJx."},{"volume-title":"Accessed","year":"2018","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"2018. Kubernetes Namespaces. https:\/\/bit.ly\/2DjOw5d.  2018. Kubernetes Namespaces. https:\/\/bit.ly\/2DjOw5d."},{"key":"e_1_3_2_1_13_1","unstructured":"2018. Let's Encrypt Stats. https:\/\/letsencrypt.org\/.  2018. Let's Encrypt Stats. https:\/\/letsencrypt.org\/."},{"key":"e_1_3_2_1_14_1","unstructured":"2018. Redis In-memory Data Structure Store Used as a Database. https:\/\/redis.io\/.  2018. Redis In-memory Data Structure Store Used as a Database. https:\/\/redis.io\/."},{"key":"e_1_3_2_1_15_1","unstructured":"2018. Symantec SSL\/TLS Certificates. https:\/\/symc.ly\/2Mp8Mpe.  2018. Symantec SSL\/TLS Certificates. https:\/\/symc.ly\/2Mp8Mpe."},{"key":"e_1_3_2_1_16_1","unstructured":"2018. XML-RPC for C\/C++. https:\/\/bit.ly\/2R0pMCS. Accessed April 25 2018.  2018. XML-RPC for C\/C++. https:\/\/bit.ly\/2R0pMCS. Accessed April 25 2018."},{"key":"e_1_3_2_1_17_1","unstructured":"2018. YAML API Reference. https:\/\/learn.getgrav.org\/advanced\/yaml.  2018. YAML API Reference. https:\/\/learn.getgrav.org\/advanced\/yaml."},{"key":"e_1_3_2_1_18_1","unstructured":"2019. An Open Source Load Testing Tool. https:\/\/locust.io\/.  2019. An Open Source Load Testing Tool. https:\/\/locust.io\/."},{"key":"e_1_3_2_1_19_1","unstructured":"2019. AWS CloudHSM. https:\/\/aws.amazon.com\/cloudhsm\/.  2019. AWS CloudHSM. https:\/\/aws.amazon.com\/cloudhsm\/."},{"key":"e_1_3_2_1_20_1","unstructured":"2019. Cloud Memorystore. https:\/\/cloud.google.com\/memorystore\/.  2019. Cloud Memorystore. https:\/\/cloud.google.com\/memorystore\/."},{"key":"e_1_3_2_1_21_1","unstructured":"2019. Google Cloud HSM. https:\/\/cloud.google.com\/hsm\/.  2019. Google Cloud HSM. https:\/\/cloud.google.com\/hsm\/."},{"key":"e_1_3_2_1_22_1","unstructured":"2019. Google Cloud Platform. https:\/\/cloud.google.com\/gcp\/  2019. Google Cloud Platform. https:\/\/cloud.google.com\/gcp\/"},{"key":"e_1_3_2_1_23_1","unstructured":"2019. Grafana. https:\/\/grafana.com\/.  2019. Grafana. https:\/\/grafana.com\/."},{"key":"e_1_3_2_1_24_1","unstructured":"2019. Horizontal Pod Autoscaler. https:\/\/bit.ly\/2Q8Ri1u.  2019. Horizontal Pod Autoscaler. https:\/\/bit.ly\/2Q8Ri1u."},{"key":"e_1_3_2_1_25_1","unstructured":"2019. Kubernetes: Production-Grade Container Orchestration. kubernetes.io\/  2019. Kubernetes: Production-Grade Container Orchestration. kubernetes.io\/"},{"key":"e_1_3_2_1_26_1","unstructured":"2019. Prometheus. https:\/\/prometheus.io\/.  2019. Prometheus. https:\/\/prometheus.io\/."},{"key":"e_1_3_2_1_27_1","unstructured":"2019. Prometheus & Grafana: Google Cloud Marketplace. https:\/\/bit.ly\/2Q8Ri1u.  2019. Prometheus & Grafana: Google Cloud Marketplace. https:\/\/bit.ly\/2Q8Ri1u."},{"key":"e_1_3_2_1_28_1","first-page":"12","article-title":"Interworking of DSRC and Cellular Network Technologies for V2X Communications: A Survey","volume":"65","author":"Abboud K.","year":"2016","journal-title":"IEEE TVT"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.33"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"e_1_3_2_1_31_1","first-page":"1065","article-title":"What Will 5G Be","volume":"32","author":"Andrews J. G.","year":"2014","journal-title":"IEEE JSAC"},{"key":"e_1_3_2_1_32_1","unstructured":"I. Ari etal 2003. Managing Flash Crowds on the Internet. In IEEE\/ACM MASCOTS. Orlando FL USA 246--249.  I. Ari et al. 2003. Managing Flash Crowds on the Internet. In IEEE\/ACM MASCOTS. Orlando FL USA 246--249."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/647218.720854"},{"key":"e_1_3_2_1_34_1","unstructured":"N. Bi\u00dfmeyer. 2014. Misbehavior Detection and Attacker Identification in Vehicular Ad-Hoc Networks. Ph.D. Dissertation. Technische Universit\u00e4t.  N. Bi\u00dfmeyer. 2014. Misbehavior Detection and Attacker Identification in Vehicular Ad-Hoc Networks. Ph.D. Dissertation. Technische Universit\u00e4t."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.58"},{"key":"e_1_3_2_1_37_1","unstructured":"L. J. Carnahan and M. E. Smid. 1994. Security Requirements for Cryptographic Modules. Technical Report.  L. J. Carnahan and M. E. Smid. 1994. Security Requirements for Cryptographic Modules. Technical Report."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"P. Cincilla etal 2016. Vehicular PKI Scalability-Consistency Trade-Offs in Large Scale Distributed Scenarios. In IEEE VNC. Columbus Ohio USA.  P. Cincilla et al. 2016. Vehicular PKI Scalability-Consistency Trade-Offs in Large Scale Distributed Scenarios. In IEEE VNC. Columbus Ohio USA.","DOI":"10.1109\/VNC.2016.7835970"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"L. Codeca etal 2015. Luxembourg SUMO Traffic (LuST) Scenario: 24 Hours of Mobility for Vehicular Networking Research. In IEEE VNC. Kyoto Japan.  L. Codeca et al. 2015. Luxembourg SUMO Traffic (LuST) Scenario: 24 Hours of Mobility for Vehicular Networking Research. In IEEE VNC. Kyoto Japan.","DOI":"10.1109\/VNC.2015.7385539"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"T. Dierks. 2008. The transport layer security protocol version 1.2. (Aug. 2008).  T. Dierks. 2008. The transport layer security protocol version 1.2. (Aug. 2008).","DOI":"10.17487\/rfc5246"},{"volume-title":"ACM Peer-to-peer Systems.","author":"Douceur J. R","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"L. Dykcik etal 2018. BlockPKI: An Automated Resilient and Transparent Public-Key Infrastructure. arXiv preprint arXiv:1809.09544 (Sep. 2018).  L. Dykcik et al. 2018. BlockPKI: An Automated Resilient and Transparent Public-Key Infrastructure. arXiv preprint arXiv:1809.09544 (Sep. 2018).","DOI":"10.1109\/ICDMW.2018.00022"},{"key":"e_1_3_2_1_45_1","unstructured":"ETSI. 2009. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Definitions.  ETSI. 2009. Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Definitions."},{"key":"e_1_3_2_1_46_1","unstructured":"L. Fischer etal 2006. Secure Revocable Anonymous Authenticated Inter-vehicle Communication (SRAAC). In ESCAR. Berlin Germany.  L. Fischer et al. 2006. Secure Revocable Anonymous Authenticated Inter-vehicle Communication (SRAAC). In ESCAR. Berlin Germany."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"e_1_3_2_1_48_1","unstructured":"D. Goodin. 2011. New Hack on Comodo Reseller Exposes Private Data.  D. Goodin. 2011. New Hack on Comodo Reseller Exposes Private Data."},{"key":"e_1_3_2_1_49_1","unstructured":"Paul Heinlein. 1998. FastCGI. Linux journal 1998 55es (1998) 1.   Paul Heinlein. 1998. FastCGI. Linux journal 1998 55es (1998) 1."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030635"},{"key":"e_1_3_2_1_51_1","unstructured":"IEEE-1609.2. 2016. IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages. (Mar. 2016).  IEEE-1609.2. 2016. IEEE Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages. (Mar. 2016)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"H. Jin M. Khodaei and P. Papadimitratos. 2016. Security and Privacy in Vehicular Social Networks. In Vehicular Social Networks. Taylor & Francis Group.  H. Jin M. Khodaei and P. Papadimitratos. 2016. Security and Privacy in Vehicular Social Networks. In Vehicular Social Networks. Taylor & Francis Group.","DOI":"10.1201\/9781315368450-12"},{"key":"e_1_3_2_1_53_1","unstructured":"Antonio K. {n. d.}. Security Architecture and Mechanisms for V2V\/V2I SeVeCom.  Antonio K. {n. d.}. Security Architecture and Mechanisms for V2V\/V2I SeVeCom."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"M. Khodaei etal 2014. Towards Deploying a Scalable & Robust Vehicular Identity and Credential Management Infrastructure. In IEEE VNC. Paderborn Germany.  M. Khodaei et al. 2014. Towards Deploying a Scalable & Robust Vehicular Identity and Credential Management Infrastructure. In IEEE VNC. Paderborn Germany.","DOI":"10.1109\/VNC.2014.7013306"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2938681.2938684"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"M. Khodaei etal 2017. RHyTHM: A Randomized Hybrid Scheme To Hide in the Mobile Crowd. In IEEE VNC. Torino Italy.  M. Khodaei et al. 2017. RHyTHM: A Randomized Hybrid Scheme To Hide in the Mobile Crowd. In IEEE VNC. Torino Italy.","DOI":"10.1109\/VNC.2017.8275642"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212481"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2018.8628340"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3226101"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2722688"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2015.2479367"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488448"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098257"},{"key":"e_1_3_2_1_64_1","unstructured":"John Leyden. 2011. Inside 'Operation Black Tulip': DigiNotar hack analysed. https:\/\/bit.ly\/2REVJ8Q.  John Leyden. 2011. Inside 'Operation Black Tulip': DigiNotar hack analysed. https:\/\/bit.ly\/2REVJ8Q."},{"volume-title":"Pseudonym-on-demand: A New Pseudonym Refill Strategy for Vehicular Communications","year":"2008","key":"e_1_3_2_1_65_1"},{"key":"e_1_3_2_1_66_1","unstructured":"Neil McAllister. 2013. Browser makers rush to block fake Google.com security cert. https:\/\/bit.ly\/2QXANoo.  Neil McAllister. 2013. Browser makers rush to block fake Google.com security cert. https:\/\/bit.ly\/2QXANoo."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Patrick McDaniel and Aviel Rubin. 2000. A Response to \"Can We Eliminate Certificate Revocation Lists?\". In FC (Springer). Berlin Heidelberg 245--258.   Patrick McDaniel and Aviel Rubin. 2000. A Response to \"Can We Eliminate Certificate Revocation Lists?\". In FC (Springer). Berlin Heidelberg 245--258.","DOI":"10.1007\/3-540-45472-1_17"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3226100"},{"volume-title":"IEEE ICVES.","author":"Papadimitratos P.","key":"e_1_3_2_1_69_1"},{"key":"e_1_3_2_1_70_1","unstructured":"Panagiotis Papadimitratos etal 2006. Securing Vehicular Communications-Assumptions Requirements and Principles. In ESCAR. Berlin Germany.  Panagiotis Papadimitratos et al. 2006. Securing Vehicular Communications-Assumptions Requirements and Principles. In ESCAR. Berlin Germany."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Panagiotis Papadimitratos etal 2007. Architecture for Secure and Private Vehicular Communications. In IEEE ITST. Sophia Antipolis 1--6.  Panagiotis Papadimitratos et al. 2007. Architecture for Secure and Private Vehicular Communications. In IEEE ITST. Sophia Antipolis 1--6.","DOI":"10.1109\/ITST.2007.4295890"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","unstructured":"P. Papadimitratos etal 2008. Impact of Vehicular Communication Security on Transportation Safety. In IEEE INFOCOM MOVE. Phoenix AZ USA 1--6.  P. Papadimitratos et al. 2008. Impact of Vehicular Communication Security on Transportation Safety. In IEEE INFOCOM MOVE. Phoenix AZ USA 1--6.","DOI":"10.1109\/INFOCOM.2008.4544663"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5307471"},{"key":"e_1_3_2_1_75_1","unstructured":"PKI-Memo. 2011. C2C-CC. http:\/\/www.car-2-car.org\/.  PKI-Memo. 2011. C2C-CC. http:\/\/www.car-2-car.org\/."},{"key":"e_1_3_2_1_76_1","unstructured":"PRESERVE-Project. 2015. www.preserve-project.eu\/.  PRESERVE-Project. 2015. www.preserve-project.eu\/."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653698"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla etal 2012. Datagram Transport Layer Security V.1.2. (Jan. 2012).  Eric Rescorla et al. 2012. Datagram Transport Layer Security V.1.2. (Jan. 2012).","DOI":"10.17487\/rfc6347"},{"key":"e_1_3_2_1_80_1","unstructured":"Sushmita Ruj and others Cavenaghi. 2011. On Data-Centric Misbehavior Detection in VANETs. In IEEE VTC. San Francisco CA USA 1--5.  Sushmita Ruj and others Cavenaghi. 2011. On Data-Centric Misbehavior Detection in VANETs. In IEEE VTC. San Francisco CA USA 1--5."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"crossref","unstructured":"F. Schaub F. Kargl Z. Ma and M. Weber. 2010. V-tokens for Conditional Pseudonymity in VANETs. In IEEE WCNC. Sydney Australia.  F. Schaub F. Kargl Z. Ma and M. Weber. 2010. V-tokens for Conditional Pseudonymity in VANETs. In IEEE WCNC. Sydney Australia.","DOI":"10.1109\/WCNC.2010.5506126"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"J. Sermersheim. 2006. Lightweight Directory Access Protocol (LDAP). (2006).  J. Sermersheim. 2006. Lightweight Directory Access Protocol (LDAP). (2006).","DOI":"10.17487\/rfc4511"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.57"},{"volume-title":"ACPC: Efficient Revocation of Pseudonym Certificates using Activation Codes","year":"2018","key":"e_1_3_2_1_84_1"},{"key":"e_1_3_2_1_85_1","unstructured":"E. Topalovic etal 2012. Towards Short-lived Certificates. IEEE Oakland Web 2.0 Security and Privacy (W2SP) (May 2012).  E. Topalovic et al. 2012. Towards Short-lived Certificates. IEEE Oakland Web 2.0 Security and Privacy (W2SP) (May 2012)."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.27"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"crossref","unstructured":"C. Vaas etal 2018. Nowhere to Hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles. In IEEE VNC. Taipei Taiwan.  C. Vaas et al. 2018. Nowhere to Hide? Mix-Zones for Private Pseudonym Change using Chaff Vehicles. In IEEE VNC. Taipei Taiwan.","DOI":"10.1109\/VNC.2018.8628449"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"crossref","unstructured":"W. Whyte A Weimerskirch V. Kumar and T. Hehn. 2013. A Security Credential Management System for V2V Communications. In IEEE VNC. Boston MA.  W. Whyte A Weimerskirch V. Kumar and T. Hehn. 2013. A Security Credential Management System for V2V Communications. In IEEE VNC. Boston MA.","DOI":"10.1109\/VNC.2013.6737583"},{"volume-title":"Inter-vehicular Networks: Why Simple Pseudonym Change is not Enough. In WONS. Kranjska Gora, Slovenia, 176--183.","year":"2010","author":"Wiedersheim B.","key":"e_1_3_2_1_89_1"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1160972.1160974"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323410","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":90,"alternative-id":["10.1145\/3317549.3323410","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323410","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}