{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:44:16Z","timestamp":1762325056274,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T00:00:00Z","timestamp":1616716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073215, 61873166"],"award-info":[{"award-number":["62073215, 61873166"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,26]]},"DOI":"10.1145\/3460537.3460545","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T22:20:56Z","timestamp":1626819656000},"page":"183-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A Blockchain-based Cross-domain Authentication for Conditional Privacy Preserving in Vehicular Ad-hoc Network"],"prefix":"10.1145","author":[{"given":"Yuhan","family":"Yang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Jing","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Chengnian","family":"Long","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Qingquan","family":"Zou","sequence":"additional","affiliation":[{"name":"SAIC Motor, China"}]},{"given":"Ji","family":"Gao","sequence":"additional","affiliation":[{"name":"SAIC Motor, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"5","article-title":"Internet of Vehicles: Architecture, Protocols, and Security","volume":"5","author":"Juan Contreras-Castillo","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"e_1_3_2_1_2_1","first-page":"2","article-title":"Networking and Communications in Autonomous Driving: A Survey","volume":"21","author":"Jiadai Wang","year":"2019","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"e_1_3_2_1_3_1","first-page":"3","article-title":"Vehicle Ad Hoc networks: applications and related technical issues","volume":"10","author":"Yasser Toor","year":"2008","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"e_1_3_2_1_4_1","first-page":"410","volume-title":"Proceedings of the 28th IEEE Symposium on Security and Privacy (SP)","author":"Stephanos","year":"2017"},{"key":"e_1_3_2_1_5_1","first-page":"12","article-title":"A Security Credential Management System for V2X Communications","volume":"19","author":"Benedikt Brecht","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2845464"},{"volume-title":"Proceedings of the 27th Conference on Computer Communications","year":"2008","author":"Chenxi Zhang","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"4","article-title":"ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs","volume":"26","author":"Jie Li","year":"2015","journal-title":"IEEE Trans Parallel Distrib Syst."},{"volume-title":"Retrieved","year":"2018","author":"U.S. Department of Transportation.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","first-page":"12","article-title":"A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs","volume":"27","author":"Zhaojun Lu","year":"2019","journal-title":"IEEE Trans Very Large Scale Integr VLSI Syst."},{"key":"e_1_3_2_1_11_1","first-page":"6","article-title":"Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems","volume":"4","author":"Ao Lei","year":"2017","journal-title":"IEEE Internet Things J."},{"volume-title":"ETSI","year":"2012","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"5","article-title":"On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment","volume":"69","author":"Anil K. Sutrala","year":"2020","journal-title":"IEEE Trans Veh Technol."},{"key":"e_1_3_2_1_14_1","first-page":"12","article-title":"An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks","volume":"10","author":"Debiao He","year":"2015","journal-title":"IEEE Trans inf foren sec."},{"key":"e_1_3_2_1_15_1","article-title":"BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks","author":"Chao Lin","year":"2020","journal-title":"IEEE Trans. Intell. Transp. Syst. Early Access"},{"key":"e_1_3_2_1_16_1","first-page":"5","article-title":". Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT","volume":"38","author":"Meng Shen","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"volume-title":"A Secure Authentication Scheme for VANETs with Batch Verification. Wireless Netw. 21 (July","year":"2015","author":"Majid","key":"e_1_3_2_1_17_1"}],"event":{"name":"ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology","acronym":"ICBCT '21","location":"Shanghai China"},"container-title":["2021 The 3rd International Conference on Blockchain Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460537.3460545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460537.3460545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:56Z","timestamp":1750193276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460537.3460545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,26]]},"references-count":17,"alternative-id":["10.1145\/3460537.3460545","10.1145\/3460537"],"URL":"https:\/\/doi.org\/10.1145\/3460537.3460545","relation":{},"subject":[],"published":{"date-parts":[[2021,3,26]]},"assertion":[{"value":"2021-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}