{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:14Z","timestamp":1750308434697,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T00:00:00Z","timestamp":1659571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,4]]},"DOI":"10.1145\/3549206.3549306","type":"proceedings-article","created":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T19:26:28Z","timestamp":1666639588000},"page":"582-590","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Preserving Privacy using Distributed Ledger Technology in Intelligent Transportation System"],"prefix":"10.1145","author":[{"given":"Amit Kumar","family":"Tyagi","sequence":"first","affiliation":[{"name":"Centre for Advanced Data Science, Vellore Institute of Technology, India"}]},{"given":"Meghna Manoj","family":"Nair","sequence":"additional","affiliation":[{"name":"School of Computer Science Engineering, Vellore Institute of Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2022,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Yuhong Li 1 Kun Ouyang Nanxuan Li Rahim Rahmani Haojun Yang Yiwei Pei 2020 A Blockchain-Assisted Intelligent Transportation System Promoting Data Services with Privacy Protection MDPI.  Yuhong Li 1 Kun Ouyang Nanxuan Li Rahim Rahmani Haojun Yang Yiwei Pei 2020 A Blockchain-Assisted Intelligent Transportation System Promoting Data Services with Privacy Protection MDPI."},{"volume-title":"IEEE International Conference on Computational Science and Engineering (CSE).","author":"H\u00eertan C.","key":"e_1_3_2_1_2_1","unstructured":"L. H\u00eertan and C. Dobre , 2018, Blockchain Privacy-Preservation in Intelligent Transportation Systems , IEEE International Conference on Computational Science and Engineering (CSE). L. H\u00eertan and C. Dobre, 2018, Blockchain Privacy-Preservation in Intelligent Transportation Systems, IEEE International Conference on Computational Science and Engineering (CSE)."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE Access","volume":"8","author":"Chavhan D.","unstructured":"S. Chavhan , D. Gupta , S. Garg , A. Khanna , B. J. Choi and M. S. Hossain , 2020, Privacy and Security Management in Intelligent Transportation System , in IEEE Access , vol. 8 . S. Chavhan, D. Gupta, S. Garg, A. Khanna, B. J. Choi and M. S. Hossain, 2020, Privacy and Security Management in Intelligent Transportation System, in IEEE Access, vol. 8."},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE Internet of Things Journal","volume":"5","author":"Contreras-Castillo S.","unstructured":"J. Contreras-Castillo , S. Zeadally and J. A. Guerrero-Iba\u00f1ez , 2018, Internet of Vehicles: Architecture, Protocols, and Security , in IEEE Internet of Things Journal , vol. 5 . J. Contreras-Castillo, S. Zeadally and J. A. Guerrero-Iba\u00f1ez, 2018, Internet of Vehicles: Architecture, Protocols, and Security, in IEEE Internet of Things Journal, vol. 5."},{"key":"e_1_3_2_1_5_1","first-page":"332","volume-title":"Third International Conference on Computational Intelligence, Communication Systems and Networks","author":"An B.","unstructured":"S. An , B. Lee and D. Shin , 2011, A Survey of Intelligent Transportation Systems , Third International Conference on Computational Intelligence, Communication Systems and Networks , pp. 332 - 337 , doi: 10.1109\/CICSyN.2011.76. 10.1109\/CICSyN.2011.76 S. An, B. Lee and D. Shin, 2011, A Survey of Intelligent Transportation Systems, Third International Conference on Computational Intelligence, Communication Systems and Networks, pp. 332-337, doi: 10.1109\/CICSyN.2011.76."},{"key":"e_1_3_2_1_6_1","volume-title":"Journal of Transport Literature","author":"Bhupendra Singh","year":"2015","unstructured":"Bhupendra Singh , Ankit Gupta , Recent trends in intelligent transportation systems: a review , Journal of Transport Literature , April , 2015 , https:\/\/doi.org\/10.1590\/2238-1031.jtl.v9n2a6 10.1590\/2238-1031.jtl.v9n2a6 Bhupendra Singh, Ankit Gupta, Recent trends in intelligent transportation systems: a review, Journal of Transport Literature, April, 2015, https:\/\/doi.org\/10.1590\/2238-1031.jtl.v9n2a6"},{"key":"#cr-split#-e_1_3_2_1_7_1.1","doi-asserted-by":"crossref","unstructured":"H. Tian X. Li H. Quan C. -C. Chang and T. Baker 2020 A lightweight attribute-based access control scheme for intelligent transportation system with full privacy protection in IEEE Sensors Journal doi: 10.1109\/JSEN.2020.3030688. 10.1109\/JSEN.2020.3030688","DOI":"10.1109\/JSEN.2020.3030688"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","doi-asserted-by":"crossref","unstructured":"H. Tian X. Li H. Quan C. -C. Chang and T. Baker 2020 A lightweight attribute-based access control scheme for intelligent transportation system with full privacy protection in IEEE Sensors Journal doi: 10.1109\/JSEN.2020.3030688.","DOI":"10.1109\/JSEN.2020.3030688"},{"key":"e_1_3_2_1_8_1","first-page":"167","volume-title":"IEEE international conference on high performance and smart computing (hpsc), and IEEE international conference on intelligent data and security (ids)","author":"Lin P.","year":"2017","unstructured":"Y. Lin , P. Wang and M. Ma , 2017, Intelligent Transportation System (ITS): Concept, Challenge and Opportunity,3rd International conference on big data security on cloud (big data security) , IEEE international conference on high performance and smart computing (hpsc), and IEEE international conference on intelligent data and security (ids) , 2017 , pp. 167 - 172 , doi: 10.1109\/BigDataSecurity.2017.50 10.1109\/BigDataSecurity.2017.50 Y. Lin, P. Wang and M. Ma, 2017, Intelligent Transportation System (ITS): Concept, Challenge and Opportunity,3rd International conference on big data security on cloud (big data security), IEEE international conference on high performance and smart computing (hpsc), and IEEE international conference on intelligent data and security (ids), 2017, pp. 167-172, doi: 10.1109\/BigDataSecurity.2017.50"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6969789"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2019.2898973"},{"key":"e_1_3_2_1_11_1","unstructured":"https:\/\/www.ibm.com\/in-en\/topics\/what-is-blockchain  https:\/\/www.ibm.com\/in-en\/topics\/what-is-blockchain"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"volume-title":"2015 IEEE Security and Privacy Workshops (pp. 180-184)","author":"Zyskind G.","key":"e_1_3_2_1_13_1","unstructured":"Zyskind , G. and Nathan , O ., 2015, May. Decentralizing privacy: Using blockchain to protect personal data . In 2015 IEEE Security and Privacy Workshops (pp. 180-184) . IEEE. Zyskind, G. and Nathan, O., 2015, May. Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops (pp. 180-184). IEEE."},{"volume-title":"2016 IEEE 19th international conference on intelligent transportation systems (ITSC) (pp. 2663-2668)","author":"Yuan Y.","key":"e_1_3_2_1_14_1","unstructured":"Yuan , Y. and Wang , F.Y ., 2016, November. Towards blockchain-based intelligent transportation systems . In 2016 IEEE 19th international conference on intelligent transportation systems (ITSC) (pp. 2663-2668) . IEEE. Yuan, Y. and Wang, F.Y., 2016, November. Towards blockchain-based intelligent transportation systems. In 2016 IEEE 19th international conference on intelligent transportation systems (ITSC) (pp. 2663-2668). IEEE."},{"volume-title":"2016 IEEE symposium on security and privacy (SP) (pp. 839-858)","author":"Kosba A.","key":"e_1_3_2_1_15_1","unstructured":"Kosba , A. , Miller , A. , Shi , E. , Wen , Z. and Papamanthou , C ., 2016, May. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts . In 2016 IEEE symposium on security and privacy (SP) (pp. 839-858) . IEEE. Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C., 2016, May. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In 2016 IEEE symposium on security and privacy (SP) (pp. 839-858). IEEE."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.28991\/esj-2020-SP1-03"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.resconrec.2021.105468"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Alam M. Ferreira J. and Fonseca J. 2016. Introduction to intelligent transportation systems. In Intelligent transportation systems (pp. 1-17). Springer Cham.  Alam M. Ferreira J. and Fonseca J. 2016. Introduction to intelligent transportation systems. In Intelligent transportation systems (pp. 1-17). Springer Cham.","DOI":"10.1007\/978-3-319-28183-4_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111245"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921605"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2114346"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Sucasas V. Mantas G. Saghezchi F.B. Radwan A. and Rodriguez J. 2016. An autonomous privacy-preserving authentication scheme for intelligent transportation systems. computers & security 60 pp.193-205.  Sucasas V. Mantas G. Saghezchi F.B. Radwan A. and Rodriguez J. 2016. An autonomous privacy-preserving authentication scheme for intelligent transportation systems. computers & security 60 pp.193-205.","DOI":"10.1016\/j.cose.2016.04.006"},{"key":"e_1_3_2_1_23_1","volume-title":"ICCSA","author":"Tyagi A.K.","year":"2020","unstructured":"Tyagi A.K. , Kumari S. , Fernandez T.F. , Aravindan C. ( 2020 ) P3 Block: Privacy Preserved, Trusted Smart Parking Allotment for Future Vehicles of Tomorrow. In: Gervasi O. (eds) Computational Science and Its Applications \u2013 ICCSA 2020 . ICCSA 2020. Lecture Notes in Computer Science, vol 12254. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-58817-5_56 10.1007\/978-3-030-58817-5_56 Tyagi A.K., Kumari S., Fernandez T.F., Aravindan C. (2020) P3 Block: Privacy Preserved, Trusted Smart Parking Allotment for Future Vehicles of Tomorrow. In: Gervasi O. (eds) Computational Science and Its Applications \u2013 ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science, vol 12254. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-58817-5_56"},{"key":"e_1_3_2_1_24_1","first-page":"5180","volume":"8","author":"Sravanthi K.","year":"2020","unstructured":"Sravanthi , K. & Burugari , Vijay Kumar & Tyagi, Amit . ( 2020 ). Preserving Privacy Techniques for Autonomous Vehicles. 8. 5180 - 5190 . 10.30534\/ijeter\/2020\/48892020. Sravanthi, K. &Burugari, Vijay Kumar & Tyagi, Amit. (2020). Preserving Privacy Techniques for Autonomous Vehicles. 8. 5180-5190. 10.30534\/ijeter\/2020\/48892020.","journal-title":"Preserving Privacy Techniques for Autonomous Vehicles."},{"key":"e_1_3_2_1_25_1","first-page":"498","volume-title":"4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","author":"Tyagi T. F.","unstructured":"A. K. Tyagi , T. F. Fernandez and S. U. Aswathy , 2021, Blockchain and Aadhaar based Electronic Voting System , 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) , Coimbatore , pp. 498 - 504 , doi: 10.1109\/ICECA49313.2020.9297655. 10.1109\/ICECA49313.2020.9297655 A. K. Tyagi, T. F. Fernandez and S. U. Aswathy, 2021, Blockchain and Aadhaar based Electronic Voting System, 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, pp. 498-504, doi: 10.1109\/ICECA49313.2020.9297655."},{"key":"e_1_3_2_1_26_1","volume-title":"Amit Kumar Tyagi","author":"Shasvi Mishra","year":"2021","unstructured":"Shasvi Mishra , Amit Kumar Tyagi , 2021 , The Role of Machine Learning Techniques in Internet of Things Based Cloud Applications, AI-IoT book, Springer . Shasvi Mishra, Amit Kumar Tyagi, 2021, The Role of Machine Learning Techniques in Internet of Things Based Cloud Applications, AI-IoT book, Springer."},{"key":"e_1_3_2_1_27_1","volume-title":"S.V.A.V. Prasad","author":"Mohan Krishna","year":"2020","unstructured":"A. Mohan Krishna , Amit Kumar Tyagi , S.V.A.V. Prasad , 2020 , Preserving Privacy in Future Vehicles of Tomorrow, JCR. ; 7(19): 6675-6684. doi: 10.31838\/jcr.07.19.768 10.31838\/jcr.07.19.768 A. Mohan Krishna, Amit Kumar Tyagi, S.V.A.V. Prasad, 2020, Preserving Privacy in Future Vehicles of Tomorrow, JCR.; 7(19): 6675-6684. doi: 10.31838\/jcr.07.19.768"},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"British Journal of Mathematics and Computer Science","author":"Amit Kumar Tyagi N.","unstructured":"Amit Kumar Tyagi , N. Sreenath , 2015 , A Comparative Study on Privacy Preserving Techniques for Location Based Services , British Journal of Mathematics and Computer Science ( ISSN : 2231-0851), Volume 10 , No .4, pp. 1 - 25 , July. Amit Kumar Tyagi, N. Sreenath, 2015, A Comparative Study on Privacy Preserving Techniques for Location Based Services, British Journal of Mathematics and Computer Science (ISSN: 2231-0851), Volume 10, No.4, pp. 1-25, July."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2017.11.12.05"},{"key":"e_1_3_2_1_30_1","volume-title":"Deep Learning Based Blockchain Solution for Preserving Privacy in Future Vehicles","author":"Varsha 0","year":"2020","unstructured":"R, Varsha 202 0 , Deep Learning Based Blockchain Solution for Preserving Privacy in Future Vehicles . 1 Jan. 2020 : 223 \u2013 236. R, Varsha 2020, Deep Learning Based Blockchain Solution for Preserving Privacy in Future Vehicles. 1 Jan. 2020: 223 \u2013 236."}],"event":{"name":"IC3-2022: 2022 Fourteenth International Conference on Contemporary Computing","acronym":"IC3-2022","location":"Noida India"},"container-title":["Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549206.3549306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3549206.3549306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:51Z","timestamp":1750268991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549206.3549306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,4]]},"references-count":31,"alternative-id":["10.1145\/3549206.3549306","10.1145\/3549206"],"URL":"https:\/\/doi.org\/10.1145\/3549206.3549306","relation":{},"subject":[],"published":{"date-parts":[[2022,8,4]]},"assertion":[{"value":"2022-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}