{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:03:46Z","timestamp":1766466226610,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340523","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Securing V2X Communications for the Future"],"prefix":"10.1145","author":[{"given":"Thanassis","family":"Giannetsos","sequence":"first","affiliation":[{"name":"Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark"}]},{"given":"Ioannis","family":"Krontiris","sequence":"additional","affiliation":[{"name":"European Research Center, Huawei Technologies, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"volume-title":"May","year":"2012","author":"Chunli L.","key":"e_1_3_2_1_1_1"},{"volume-title":"https:\/\/preserve-project.eu\/ {Online","year":"2017","author":"PRESERVE","key":"e_1_3_2_1_2_1"},{"volume-title":"Intelligent transportation systems for smart cities: a progress review,\" Science China Information Sciences","year":"2012","author":"Xiong Z.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627402"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_6_1","unstructured":"\"Intelligent Transport Systems (ITS); Security; Security Header and Certificate Formats \" Technical Specification October 2017.  \"Intelligent Transport Systems (ITS); Security; Security Header and Certificate Formats \" Technical Specification October 2017."},{"volume-title":"http:\/\/www.etsi.org\/deliver\/etsi_ts\/102900_102999\/102941\/01.01.01_60\/ts_102941v010101p.pdf {Online","year":"2017","author":"Trust ETSI","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Cybernetics and Informatics (SCI)","author":"Gollan L.","year":"2002"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"e_1_3_2_1_10_1","first-page":"111","article-title":"SEROSA: service oriented security architecture for vehicular communications","author":"Gisdakis S.","year":"2013","journal-title":"VNC. IEEE"},{"volume-title":"Proceedings of the 4th Workshop on Embedded Security in Cars (ESCAR)","year":"2006","author":"Gerlach M.","key":"e_1_3_2_1_11_1"},{"first-page":"1","volume-title":"Dec 2013","author":"Whyte W.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250354"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196520"},{"key":"e_1_3_2_1_15_1","unstructured":"5GPPP \"5g Automotive Vision \" 2015.  5GPPP \"5g Automotive Vision \" 2015."},{"first-page":"123","volume-title":"Nov 2017","author":"Whitefield J.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"first-page":"71","volume-title":"Dec 2013","author":"Lef\u00e8vre S.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"\"Processing personal data in the context of C-ITS \" Document March 2017.  \"Processing personal data in the context of C-ITS \" Document March 2017."},{"volume-title":"November","year":"2016","author":"Cooperative Intelligent Transport Systems A European","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"\"Opinion 03\/2017 on Processing personal data in the context of Cooperative Intelligent Transport Systems (C-ITS) \" Document October 2017.  \"Opinion 03\/2017 on Processing personal data in the context of Cooperative Intelligent Transport Systems (C-ITS) \" Document October 2017."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.135"},{"volume-title":"First International Workshop, IPTPS","year":"2002","author":"Douceur J. R.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2015.2479367"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"volume-title":"Ingolstadt","year":"2009","author":"Weyl B.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"Sophia Antipolis","author":"Papadimitratos P.","year":"2007"},{"key":"e_1_3_2_1_28_1","unstructured":"PRECIOSA \"PRivacy Enabled Capability In Cooperative Systems and Safety Applications - D1 \" Nov. 2009. {Online}. Available: http:\/\/www.preciosa-project.org\/  PRECIOSA \"PRivacy Enabled Capability In Cooperative Systems and Safety Applications - D1 \" Nov. 2009. {Online}. Available: http:\/\/www.preciosa-project.org\/"},{"volume-title":"Rep.","year":"2011","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31912-9_20"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_32_1","unstructured":"\"Intelligent Transport Systems (ITS); Security; Security Services and Architecture \" Technical Specification September 2010.  \"Intelligent Transport Systems (ITS); Security; Security Services and Architecture \" Technical Specification September 2010."},{"volume-title":"June","year":"2014","author":"Moser M.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"S. S. Wu R. V. Sabett D. S. Chokhani D. W. S. Ford and C. C. R. Merrill \"Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework \" RFC 3647 Nov. 2003.  S. S. Wu R. V. Sabett D. S. Chokhani D. W. S. Ford and C. C. R. Merrill \"Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework \" RFC 3647 Nov. 2003."},{"first-page":"176","volume-title":"Feb 2010","author":"Wiedersheim B.","key":"e_1_3_2_1_35_1"},{"first-page":"380","volume-title":"March 2010","author":"Nowatkowski M. E.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490428.2490444"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2010.06.001"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110309"},{"key":"e_1_3_2_1_40_1","unstructured":"Trusted Computing Group \"Trusted Platform Module (TPM) | Trusted Computing Group (TPM) \" https:\/\/trustedcomputinggroup.org\/work-groups\/trusted-platform-module\/ {Online; accessed 26-August-2017}.  Trusted Computing Group \"Trusted Platform Module (TPM) | Trusted Computing Group (TPM) \" https:\/\/trustedcomputinggroup.org\/work-groups\/trusted-platform-module\/ {Online; accessed 26-August-2017}."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41395-7"},{"key":"e_1_3_2_1_43_1","first-page":"427","volume-title":"Anonymous Attestation with Subverted TPMs,\" in Advances in Cryptology - CRYPTO","author":"Camenisch J.","year":"2017"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"volume-title":"REWIRE -- Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks,\" in Trust and Trustworthy Computing","year":"2015","author":"F\u00f6rster D.","key":"e_1_3_2_1_45_1"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340523"}},"subtitle":["Can PKI Systems offer the answer?"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":45,"alternative-id":["10.1145\/3339252.3340523","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340523","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}