{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:20Z","timestamp":1740141800502,"version":"3.37.3"},"reference-count":23,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60873195","2011AA060406","090412051"],"award-info":[{"award-number":["60873195","2011AA060406","090412051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program of China","award":["60873195","2011AA060406","090412051"],"award-info":[{"award-number":["60873195","2011AA060406","090412051"]}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province","doi-asserted-by":"publisher","award":["60873195","2011AA060406","090412051"],"award-info":[{"award-number":["60873195","2011AA060406","090412051"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,4,1]]},"abstract":"<jats:p> Security and privacy have been important issues in VANETs. Anonymity is an effective way to achieve privacy protection, and it sometimes requires to be disclosed for determining traffic liability. In most pseudonym schemes, an authority is aware of a vehicle's secret, and its compromise will result in the leakage of a large amount of privacy information. So, we propose a distributed traceable pseudonym management scheme in VANETs. In the scheme, a blind signature method is adopted to achieve strict separation of issuance and tracking. The distributed tracking protocol is proposed to enhance the robustness for tracking, which is based on the improved scheme for shared generation of RSA keys. An efficient pseudonymous authentication mechanism is proposed to reduce the communication overhead. Compared with other related proposals, our scheme is unforgeability, especially against authority forge attacks, and has better robustness. Moreover, the performance analysis shows that it is efficient in VANETs. <\/jats:p>","DOI":"10.1155\/2013\/615906","type":"journal-article","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T03:11:28Z","timestamp":1367464288000},"page":"615906","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Distributed Pseudonym Management Scheme in VANETs"],"prefix":"10.1177","volume":"9","author":[{"given":"Xiaoling","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Computer and Information, Hefei University of Technology, Hefei 230009, China"}]},{"given":"Yang","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Hefei University of Technology, Hefei 230009, China"},{"name":"The Anhui Provincial Key Laboratory of Mine IoT and Mine Safety Supervisory Control, Hefei 230088, China"}]},{"given":"Benhong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Hefei University of Technology, Hefei 230009, China"}]},{"given":"Zhengfeng","family":"Hou","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Hefei University of Technology, Hefei 230009, China"}]}],"member":"179","published-online":{"date-parts":[[2013,4,30]]},"reference":[{"key":"B1-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2004.838218"},{"key":"B2-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.26"},{"first-page":"1","volume-title":"Proceedings of the 4th Workshop on Hot Topics in Networks (HotNets-IV)","author":"Parno B.","key":"B3-2013-615906"},{"key":"B4-2013-615906","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"B5-2013-615906","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"B6-2013-615906","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"key":"B7-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"B8-2013-615906","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"B9-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.58"},{"first-page":"1229","volume-title":"Proceedings of the IEEE 27th Conference on Computer Communications (INFOCOM '08)","author":"Lu R.","key":"B10-2013-615906"},{"key":"B11-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"B12-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110311"},{"key":"B13-2013-615906","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"B14-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506126"},{"key":"B15-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"B16-2013-615906","first-page":"199","volume-title":"Advances in Crypto '82","author":"Chaum D.","year":"1982"},{"key":"B18-2013-615906","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741885"},{"first-page":"135","volume-title":"Proceedings of the 9th ACM international workshop on Vehicular Inter-Networking, Systems, and Applications","author":"Feiri M.","key":"B19-2013-615906"},{"key":"B20-2013-615906","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"first-page":"425","volume-title":"Proceedings of Crypto '97","author":"Boneh D.","key":"B21-2013-615906"},{"first-page":"89","volume-title":"Proceedings of the 6th IMA International Conference on Cryptography and Coding","author":"Cocks C.","key":"B22-2013-615906"},{"first-page":"43","volume-title":"Proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security","author":"Malkin M.","key":"B23-2013-615906"},{"key":"B26-2013-615906","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110310"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/615906","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/615906","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/615906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T21:54:58Z","timestamp":1621202098000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/615906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4,1]]}},"alternative-id":["10.1155\/2013\/615906"],"URL":"https:\/\/doi.org\/10.1155\/2013\/615906","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}