{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T22:56:46Z","timestamp":1774911406226,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,11,10]],"date-time":"2011-11-10T00:00:00Z","timestamp":1320883200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1186\/1687-1499-2011-167","type":"journal-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T14:19:19Z","timestamp":1323785959000},"source":"Crossref","is-referenced-by-count":8,"title":["Secure protocols for data propagation and group communication in vehicular networks"],"prefix":"10.1186","volume":"2011","author":[{"given":"Meng-Yen","family":"Hsieh","sequence":"first","affiliation":[]},{"given":"Hua-Yi","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chin-Feng","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,10]]},"reference":[{"issue":"20","key":"161_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1386853.1378356","volume":"9","author":"V Kapoor","year":"2008","unstructured":"Kapoor V, Abraham VS, Singh R: Elliptic curve cryptography. Ubiquity 2008, 9(20):1-8.","journal-title":"Ubiquity"},{"issue":"3","key":"161_CR2","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1504\/IJSN.2006.011772","volume":"1","author":"W Haodong","year":"2006","unstructured":"Haodong W, Bo S, Quan L: Elliptic curve cryptography-based access control in sensor networks. Int J Security Netw 2006, 1(3):127-137. 10.1504\/IJSN.2006.011772","journal-title":"Int J Security Netw"},{"key":"161_CR3","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/ICECTECH.2011.5941972","volume":"5","author":"T Kavitha","year":"2011","unstructured":"Kavitha T, Priya SJS, Sridharan D: Design of deterministic key pre distribution using number theory. 3rd International Conference on Electronics Computer Technology (ICECT 2011) 2011, 5: 134-137.","journal-title":"3rd International Conference on Electronics Computer Technology (ICECT 2011)"},{"issue":"6","key":"161_CR4","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","volume":"56","author":"X Lin","year":"2007","unstructured":"Lin X, Sun X, Ho P-H, Shen X: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 2007, 56(6):3442-3456.","journal-title":"IEEE Trans Veh Technol"},{"key":"161_CR5","volume-title":"Processing of the 22nd IEEE International Conference on Distributed Computing Systems","author":"Y Amir","year":"2002","unstructured":"Amir Y, Kim Y, Nita-Rotaru C, Tsudik G: On the performance of group key agreement protocols. Processing of the 22nd IEEE International Conference on Distributed Computing Systems 2002."},{"key":"161_CR6","first-page":"241","volume-title":"5th IFIP-TC6 International Conference on Mobile and Wireless Communications Networks","author":"E Bresson","year":"2003","unstructured":"Bresson E, Chevassut O, Essiari A, Pointcheval D: Mutual authentication and group key agreement for low-power mobile devices. 5th IFIP-TC6 International Conference on Mobile and Wireless Communications Networks 2003, 241-250."},{"key":"161_CR7","first-page":"1","volume-title":"Proceedings of 5th ACM Conference on Computer and Communication Security","author":"C Becker","year":"1998","unstructured":"Becker C, Wille U: Communication complexity of group key distribution. Proceedings of 5th ACM Conference on Computer and Communication Security 1998, 1-6."},{"key":"161_CR8","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1007\/978-3-540-75867-9_146","volume":"4739\/2007","author":"J Nikodem","year":"2007","unstructured":"Nikodem J, Nikodem M: Secure and scalable communication in vehicle ad hoc network. Lecture Notes in Computer Science 2007, 4739\/2007: 1167-1174.","journal-title":"Lecture Notes in Computer Science"},{"issue":"4","key":"161_CR9","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/TVT.2009.2038222","volume":"59","author":"Z Lei","year":"2010","unstructured":"Lei Z, Qianhong W, Solanas A, Domingo-Ferrer J: A scalable robust authentication protocol for secure vehicular communications. IEEE Trans Veh Technol 2010, 59(4):1606-1617.","journal-title":"IEEE Trans Veh Technol"},{"key":"161_CR10","first-page":"8","volume-title":"Int J Veh Technol","author":"I Broustis","year":"2008","unstructured":"Broustis I, Faloutsos M: Routing in vehicular networks: feasibility, modeling, and security. Int J Veh Technol 2008, 8. Article ID 267513"},{"key":"161_CR11","doi-asserted-by":"crossref","unstructured":"Wu H, Fujimoto R, Guensler R, Hunter M: MDDV: a mobility-centric data dissemination algorithm for vehicular networks. Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET '04) 47-56.","DOI":"10.1145\/1023875.1023884"},{"key":"161_CR12","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/IVS.2003.1212901","volume-title":"Proceedings of the IEEE Intelligent Vehicles Symposium (IV '03)","author":"C Lochert","year":"2003","unstructured":"Lochert C, Hartenstein H, Tian J, Fu\u00dfler H, Hermann D, Mauve M: A routing strategy for vehicular ad hoc networks in city environments. In Proceedings of the IEEE Intelligent Vehicles Symposium (IV '03). Columbus, Ohio, USA; 2003:156-161."},{"key":"161_CR13","volume-title":"Proceedings of the European Wireless Conference (EuroWireless'02)","author":"M El Zarki","year":"2002","unstructured":"El Zarki M, Mehrotra S, Tsudik G, Venkatasubramanian N: Security issues in a future vehicular network. In Proceedings of the European Wireless Conference (EuroWireless'02). Florence, Italy; 2002."},{"key":"161_CR14","first-page":"213","volume-title":"Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology","author":"D Boneh","year":"2001","unstructured":"Boneh D, Franklin M: Identity-based encryption from the weil pairing. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology. Lecture Notes in Computer Science Santa Barbara, CA, USA; 2001:213-229."},{"issue":"4","key":"161_CR15","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.1109\/TWC.2008.061080","volume":"7","author":"C Tang","year":"2008","unstructured":"Tang C, Wu DO: An efficient mobile authentication scheme for wireless networks. IEEE Trans Wirel Commun 2008, 7(4):1408-1416.","journal-title":"IEEE Trans Wirel Commun"},{"key":"161_CR16","first-page":"15","volume-title":"EURASIP J Wirel Commun Netw","author":"H-K Choi","year":"2011","unstructured":"Choi H-K, Kim I-H, Yoo J-C: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J Wirel Commun Netw 2011, 15. Article ID 716794"},{"issue":"2","key":"161_CR17","first-page":"21","volume":"2","author":"A Khalique","year":"2010","unstructured":"Khalique A, Singh K, Sood S: Implementation of elliptic curve digital signature algorithm. Int J Comput Appl 2010, 2(2):21-27.","journal-title":"Int J Comput Appl"},{"issue":"5","key":"161_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/WC-M.2006.250356","volume":"13","author":"D Jiang","year":"2006","unstructured":"Jiang D, Taliwal V, Meier A, Holfelder W, Herrtwich R: Design of 5.9 GHz DSRC-based vehicular safety communication. IEEE Trans Wirel Commun 2006, 13(5):36-43.","journal-title":"IEEE Trans Wirel Commun"},{"key":"161_CR19","first-page":"13","volume-title":"EURASIP J Wirel Commun Netw","author":"C Laurendeau","year":"2009","unstructured":"Laurendeau C, Barbeau M: Probabilistic localization and tracking of malicious insiders using hyperbolic position bounding in vehicular networks. EURASIP J Wirel Commun Netw 2009, 13. Article ID 128679"},{"key":"161_CR20","unstructured":"GoogleMap APIs[\n                    http:\/\/code.google.com\/intl\/zh-TW\/apis\/maps\/index.html\n                    \n                  ]"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2011-167\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-167.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2011-167.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T17:03:34Z","timestamp":1548090214000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2011-167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,10]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["161"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2011-167","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,10]]},"article-number":"167"}}