{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T22:36:34Z","timestamp":1774650994883,"version":"3.50.1"},"reference-count":191,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,6,30]]},"abstract":"<jats:p>Vehicular ad-hoc networks (VANETs) have revolutionized the world with smart traffic management, better utilizing the road environment, and providing safety and convenience to the vehicles\u2019 drivers. Despite the useful features of VANETs, there are some privacy issues, which hinder their way toward achieving smarter and safer traffic in the world. Location privacy is one of the critical research challenges for the efficient deployment of VANETs. This challenge can be solved using a pseudonym instead of an actual vehicle identity in the beacon messages. For this purpose, many location privacy schemes are introduced in the literature. In this article, we thoroughly review the existing location privacy schemes and present their comprehensive taxonomy. We discuss the design challenges for the development of an efficient location privacy scheme. Moreover, the existing location privacy techniques are critically analyzed based on diverse road network environments and parameters. Various issues and challenges regarding the pseudonym-changing process are elaborated in detail. Finally, we discuss the future trends for the implementation of location privacy in a vehicular network.<\/jats:p>","DOI":"10.1145\/3711681","type":"journal-article","created":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T11:20:58Z","timestamp":1736508058000},"page":"1-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Location Privacy Schemes in Vehicular Networks: Taxonomy, Comparative Analysis, Design Challenges, and Future Opportunities"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2437-216X","authenticated-orcid":false,"given":"Ikram","family":"Ullah","sequence":"first","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan and Department of Computer Science, City University of Science and Information Technology, Peshawar, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4037-3405","authenticated-orcid":false,"given":"Munam","family":"Ali Shah","sequence":"additional","affiliation":[{"name":"Department of Computer Networks and Communication, College of Computer Science and Information Technology, King Faisal University, Al Ahsa, Saudi Arabia and Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2712-1956","authenticated-orcid":false,"given":"Abid","family":"Khan","sequence":"additional","affiliation":[{"name":"College of Science and Engineering, School of Computing, University of Derby, Derby, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"College of Engineering, Qatar University, Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2025,2,10]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1863-4"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2018.2890476"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"e_1_3_1_5_2","unstructured":"SAE-International. 2009. SAE J2735 dedicated short range communications (DSRC) message set dictionary. DSRC Comm. (2009)."},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.010214.122008"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.08.017"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0352-x"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2345420"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2718178"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771522"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2818888"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2019.8822028"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2019.8667248"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.02.002"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100411"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036044"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3125521"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASID52932.2021.9651711"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi13040096"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102618"},{"key":"e_1_3_1_26_2","unstructured":"F. D. Da Cunha Z. Boukerche L. Villas A. Carneiro Viana and A. A. F. Loureiro. 2014. Data communication in VANETs: A survey challenges and applications. Research Report RR-8498 INRIA Saclay 1\u201326 http:\/\/hal.inria.fr\/hal-00981126\/."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7513860"},{"key":"e_1_3_1_28_2","article-title":"IEEE trial-use standard for wireless access in vehicular environments-security services for applications and management messages","volume":"1609","author":"Committee I. T. S.","year":"2006","unstructured":"I. T. S. Committee. 2006. IEEE trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE Veh. Technol. 1609, (2006).","journal-title":"IEEE Veh. Technol."},{"key":"e_1_3_1_29_2","first-page":"1","article-title":"IEEE standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements part 3: Carrier sense multiple access with collision detection (CSMA\/CD) access method an","year":"2005","unstructured":"IEEE. 2005. IEEE standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements part 3: Carrier sense multiple access with collision detection (CSMA\/CD) access method an. IEEE Standard 802.3-2005 (Revision IEEE Standard 802.3-2002 Incl. all Approv. Amend.), 1\u20132695.","journal-title":"IEEE Standard 802.3-2005 (Revision IEEE Standard 802.3-2002 Incl"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8424577"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5170-5_1"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.003"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625806"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7697324"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.135"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0461-4"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2017.080914"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.519"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249491"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4469-4"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2245-6"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730479"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/MoWNet.2017.8045942"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2162864"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.070113.122816"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2016.7835971"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249449"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2015.7322723"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2018.10102"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800907"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071007"},{"key":"e_1_3_1_53_2","unstructured":"K. Emara W. Woerndl and J. Schlichter. 2016. Context-based pseudonym changing scheme for vehicular ad hoc networks. arXiv:1607.07656 Retrieved from http:\/\/arxiv.org\/abs\/1607.07656."},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.142"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijahuc.2018.094404"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2321747"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0175-4"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3437"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684166"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544929"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069376"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690701"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.09.005"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/3821593"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201815006038"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2736885"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4626-0"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4469-4"},{"key":"e_1_3_1_69_2","author":"Emara A. E.","year":"2016","unstructured":"A. E. Emara. 2016. Safety-aware Location Privacy in Vehicular Ad-Hoc Networks. Doctoral Dissertation. Technische Universit\u00e4t M\u00fcnchen.","journal-title":"Safety-aware Location Privacy in Vehicular Ad-Hoc Networks"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.103"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2013.6799933"},{"key":"e_1_3_1_74_2","first-page":"1","article-title":"Mix-zones for location privacy in vehicular networks","volume":"51","author":"Freudiger J.","year":"2007","unstructured":"J. Freudiger, M. Raya, M. F\u00e9legyh\u00e1zi, P. Papadimitratos, and J.-P. Hubaux. 2007. Mix-zones for location privacy in vehicular networks. ACM Work. Wireless Netw. Intell. Transp. Syst. 51 (2007), 1\u20137.","journal-title":"ACM Work. Wireless Netw. Intell. Transp. Syst."},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108111"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10111302"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962919"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.198"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2013.6799822"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2487262"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0269-z"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21093077"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4690-5"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842339"},{"issue":"10","key":"e_1_3_1_85_2","first-page":"1","article-title":"A location privacy-preserving scheme for VANETs based on virtual mix zone","volume":"3","author":"Guo N.","year":"2017","unstructured":"N. Guo, L. Ma, and T. Gao. 2017. A location privacy-preserving scheme for VANETs based on virtual mix zone. Res. Briefs Inf. Commun. Technol. Evol. 3, 10 (2017), 1\u20138.","journal-title":"Res. Briefs Inf. Commun. Technol. Evol."},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/INDS.2014.20"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3254660"},{"key":"e_1_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2838136"},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2797206"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"e_1_3_1_91_2","first-page":"1","article-title":"CARAVAN: Providing location privacy for VANET","author":"Sampigethaya K.","year":"2005","unstructured":"K. Sampigethaya, L. Huang, M. Li, K. Poovendran, Radha Matsuura, and K. Sezaki. 2005. CARAVAN: Providing location privacy for VANET. Embed. Secur. Cars 8 (2005), 1\u201315.","journal-title":"Embed. Secur. Cars"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494209"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2011.0212"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/CICSYN.2009.79"},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2009.5416380"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3088762"},{"key":"e_1_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23010531"},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00662-6"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766500"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110362"},{"key":"e_1_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891099"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/CAVS51000.2020.9334559"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108613"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500880"},{"key":"e_1_3_1_105_2","first-page":"257","volume-title":"Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of Cryptographic Techniques","author":"Chaum D.","year":"1991","unstructured":"D. Chaum and E. van Heyst. 1991. Group Signatures. In Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, 257\u2013265."},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100247"},{"key":"e_1_3_1_107_2","first-page":"31","volume-title":"Identity-based Cryptography","author":"Kiltz E.","year":"2009","unstructured":"E. Kiltz and G. Neven. 2009. Identity-based signatures. In Identity-based Cryptography. IOS Press, 31\u201344."},{"key":"e_1_3_1_108_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.09.016"},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.03.005"},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01227-z"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.32"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/473151"},{"key":"e_1_3_1_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2013.6674204"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"e_1_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962526"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2012.6221234"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2014.135"},{"key":"e_1_3_1_118_2","doi-asserted-by":"publisher","DOI":"10.3390\/e24050648"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2017.8001459"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604052"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5983992"},{"key":"e_1_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2013.6614808"},{"key":"e_1_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2014.7013305"},{"key":"e_1_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399291"},{"key":"e_1_3_1_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795607"},{"key":"e_1_3_1_126_2","doi-asserted-by":"publisher","DOI":"10.1109\/ECS.2014.6892619"},{"key":"e_1_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254013"},{"key":"e_1_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2013.6549052"},{"key":"e_1_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0167-4"},{"key":"e_1_3_1_130_2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3704"},{"key":"e_1_3_1_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2010.5698239"},{"key":"e_1_3_1_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069719"},{"key":"e_1_3_1_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2164068"},{"key":"e_1_3_1_134_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.03.006"},{"key":"e_1_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0557-5"},{"key":"e_1_3_1_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654825"},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01351-0_4"},{"key":"e_1_3_1_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2014.6856595"},{"key":"e_1_3_1_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.33"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2015.7132917"},{"key":"e_1_3_1_141_2","first-page":"6","volume-title":"Proceedings of the IEEE 14th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM\u201913)","author":"Emara K.","year":"2013","unstructured":"K. Emara. Location privacy in vehicular networks. In Proceedings of the IEEE 14th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM\u201913). IEEE, 6\u20137, 2013."},{"key":"e_1_3_1_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.33"},{"key":"e_1_3_1_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2637902"},{"key":"e_1_3_1_144_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4204"},{"key":"e_1_3_1_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045740"},{"key":"e_1_3_1_146_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1424078"},{"key":"e_1_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00152"},{"key":"e_1_3_1_148_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05063-4_17"},{"key":"e_1_3_1_149_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746396"},{"key":"e_1_3_1_150_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761415"},{"key":"e_1_3_1_151_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3001381"},{"key":"e_1_3_1_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2007.179"},{"key":"e_1_3_1_153_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2156790"},{"key":"e_1_3_1_154_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110314"},{"key":"e_1_3_1_155_2","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2011.40"},{"key":"e_1_3_1_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICVES.2008.4640905"},{"key":"e_1_3_1_157_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935026"},{"key":"e_1_3_1_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2010.5644986"},{"key":"e_1_3_1_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2011.6085411"},{"key":"e_1_3_1_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962947"},{"key":"e_1_3_1_161_2","doi-asserted-by":"publisher","DOI":"10.1109\/NCIS.2011.127"},{"key":"e_1_3_1_162_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-012-0242-7"},{"key":"e_1_3_1_163_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.199"},{"key":"e_1_3_1_164_2","doi-asserted-by":"publisher","DOI":"10.4108\/eai.21-6-2018.2276638"},{"key":"e_1_3_1_165_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21072443"},{"key":"e_1_3_1_166_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100183"},{"key":"e_1_3_1_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2010.5645015"},{"key":"e_1_3_1_168_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECon.2012.6196902"},{"key":"e_1_3_1_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.455"},{"key":"e_1_3_1_170_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93332-0_2"},{"key":"e_1_3_1_171_2","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"e_1_3_1_172_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2010.5453849"},{"key":"e_1_3_1_173_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00182"},{"key":"e_1_3_1_174_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1681-8"},{"key":"e_1_3_1_175_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4690-5"},{"key":"e_1_3_1_176_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01304-3"},{"key":"e_1_3_1_177_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3109238"},{"key":"e_1_3_1_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2010.5437115"},{"key":"e_1_3_1_179_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.003"},{"key":"e_1_3_1_180_2","doi-asserted-by":"publisher","DOI":"10.1007\/11964254_6"},{"key":"e_1_3_1_181_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.001"},{"key":"e_1_3_1_182_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"e_1_3_1_183_2","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275632"},{"key":"e_1_3_1_184_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921605"},{"key":"e_1_3_1_185_2","doi-asserted-by":"publisher","DOI":"10.1007\/b138483"},{"key":"e_1_3_1_186_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"e_1_3_1_187_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.68"},{"key":"e_1_3_1_188_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1019-x"},{"key":"e_1_3_1_189_2","first-page":"1455","article-title":"The changing wind of data privacy law: A comparative study of the European Union's general data protection regulation and the 2018 California consumer privacy act","volume":"10","author":"Park Grace","year":"2019","unstructured":"Grace Park. 2019. The changing wind of data privacy law: A comparative study of the European Union's general data protection regulation and the 2018 California consumer privacy act. UC Irvine L. Rev 10 (2019), 1455.","journal-title":"UC Irvine L. Rev"},{"key":"e_1_3_1_190_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3485650"},{"key":"e_1_3_1_191_2","first-page":"1178","volume":"12","author":"Hui Li","year":"2019","unstructured":"Li Hui, Lishuang Pei, Dan Liao, Gang Sun, and Du Xu. 2019. Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer-to-Peer Networking Appl. 12 (2019), 1178\u20131193.","journal-title":"Blockchain meets VANET: An architecture for identity and location privacy protection in VANET. Peer-to-Peer Networking Appl"},{"key":"e_1_3_1_192_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000430"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:19:15Z","timestamp":1750295955000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,10]]},"references-count":191,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6,30]]}},"alternative-id":["10.1145\/3711681"],"URL":"https:\/\/doi.org\/10.1145\/3711681","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,10]]},"assertion":[{"value":"2023-07-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}