{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:48Z","timestamp":1750220388425,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3507021","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"1925-1931","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["UAV-VANET authentication for real-time highway surveillance"],"prefix":"10.1145","author":[{"given":"Otto B.","family":"Piramuthu","sequence":"first","affiliation":[{"name":"UIUC"}]},{"given":"Matthew","family":"Caesar","sequence":"additional","affiliation":[{"name":"UIUC"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072431"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024587"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3038834"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045425"},{"key":"e_1_3_2_1_5_1","first-page":"169","article-title":"Identification Tokens - or: Solving the Chess Grandmaster Problem. Advances in Cryptology-CRYPTO'90","volume":"537","author":"Beth T.","year":"1990","unstructured":"T. Beth, Y. Desmedt (1990) Identification Tokens - or: Solving the Chess Grandmaster Problem. Advances in Cryptology-CRYPTO'90, Springer LNCS 537, 169--176.","journal-title":"Springer LNCS"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1999-72-304"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2013.07.002"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.09.019"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2991168"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.06.013"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2975226"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4273"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.080168"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989790"},{"key":"e_1_3_2_1_16_1","volume-title":"Intelligent UAV-Assisted Routing Protocol for Urban VANETs. Computer Comms","author":"Oubbati O.S.","year":"2017","unstructured":"O.S. Oubbati, A. Lakas, F. Zhou, M. Gunes, N. Lagraa, M.B. Yagoubi (2017) Intelligent UAV-Assisted Routing Protocol for Urban VANETs. Computer Comms."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3520"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"H. Sikarwar A. Nahar D. Das (2020) \"LABVS: Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV).\" IEEE 91st Vehicular Technology Conference (VTC2020-Spring) 1--6 10.1109\/VTC2020-Spring48590.2020.9129180","DOI":"10.1109\/VTC2020-Spring48590.2020.9129180"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.05.007"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2986585"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967973.2968609"}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event","acronym":"SAC '22"},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507021","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3507021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:33Z","timestamp":1750191513000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":21,"alternative-id":["10.1145\/3477314.3507021","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3507021","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}