{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T13:40:19Z","timestamp":1718372419184},"reference-count":58,"publisher":"CRC Press","isbn-type":[{"value":"9781498721912","type":"print"},{"value":"9781498721929","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1201\/b19351-12","type":"book-chapter","created":{"date-parts":[[2016,2,19]],"date-time":"2016-02-19T10:28:21Z","timestamp":1455877701000},"page":"151-168","source":"Crossref","is-referenced-by-count":0,"title":["Security and Privacy in Vehicular Networks: Challenges and Algorithm"],"prefix":"10.1201","author":[{"given":"Yi","family":"Gai","sequence":"first","affiliation":[]},{"given":"Jian","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,2,16]]},"reference":[{"key":"p_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4539481"},{"key":"p_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625806"},{"key":"p_3","first-page":"1206","author":"Figueiredo L.","year":"2001","journal-title":"IEEE Intelligent Transportation Systems"},{"key":"p_4","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2004.1270548"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"p_6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"p_7","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2012.2190177"},{"key":"p_8","first-page":"6","volume-title":"The Third International Conference on Advances in Vehicular Systems, Technologies and Applications (VEHICULAR)","author":"Lacroix J.","year":"2014"},{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-49"},{"key":"p_10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36169-2_4"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0191"},{"key":"p_12","first-page":"3","volume-title":"The 2009 International Conference on Wireless Networks (ICWN)","author":"Ertaul L.","year":"2009"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601954"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"p_15","first-page":"468","volume-title":"2013 International Conference on Information Networking (ICOIN)","author":"Kim Y.","year":"2013"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2198837"},{"key":"p_17","volume-title":"Overview of security issues in vehicular adhoc networks","author":"Fuentes J.M.","year":"2010"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2008.610"},{"key":"p_19","volume-title":"Denial of service (dos) attack and its possible solutions in vanet","author":"Hasbullah H.","year":"2010"},{"key":"p_20","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2008.4732612"},{"key":"p_21","volume-title":"Real-time detection of denial-of-service attacks in IEEE 802.11","author":"Lyamin N.","year":"2014"},{"key":"p_22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCOINS.2014.6868377"},{"key":"p_23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2011.6141364"},{"key":"p_25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36169-2"},{"key":"p_26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2007.4437823"},{"key":"p_27","volume-title":"The 2nd International Workshop on Intelligent Transportation","author":"Doetzer F.","year":"2005"},{"key":"p_28","volume-title":"ACM","author":"Panayappan R.","year":"2007"},{"key":"p_29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036781"},{"key":"p_30","doi-asserted-by":"publisher","DOI":"10.1109\/SDR.2006.4286333"},{"key":"p_31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.04.090746"},{"key":"p_32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080104"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2010.26"},{"key":"p_34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198911"},{"key":"p_35","doi-asserted-by":"publisher","DOI":"10.1145\/1621076.1621084"},{"key":"p_36","first-page":"208","volume-title":"The 28th International Performance Computing and Communications Conference (IPCCC)","author":"Chen Z.","year":"2009"},{"key":"p_37","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"p_38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235288"},{"key":"p_39","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562534"},{"issue":"5","key":"p_40","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1002\/dac.1102","volume":"23","author":"Le\u00f3n O.","year":"2010","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"p_41","first-page":"138","volume":"20","author":"Pei Q.","year":"2011","journal-title":"Chinese Journal of Electronics"},{"key":"p_42","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.032511.00097"},{"issue":"12","key":"p_43","first-page":"3417","volume":"86","author":"Sakaguchi K.","year":"2003","journal-title":"IEICE Transactions on Communications"},{"key":"p_44","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1495058"},{"key":"p_45","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2002.1046739"},{"key":"p_46","doi-asserted-by":"publisher","DOI":"10.1145\/1023783.1023802"},{"key":"p_47","first-page":"448","volume-title":"Automation Test in Europe Conference Exhibition (DATE)","author":"Li C.","year":"2009"},{"key":"p_48","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2004.1399240"},{"key":"p_49","doi-asserted-by":"publisher","DOI":"10.1002\/9780470515143.ch11"},{"key":"p_50","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.251"},{"key":"p_51","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2009.6391387"},{"key":"p_52","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2009.5054704"},{"key":"p_53","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5496102"},{"key":"p_56","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2007.78"},{"key":"p_57","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514299"},{"key":"p_58","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557594"},{"key":"p_59","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.33"},{"key":"p_60","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2009.5073450"}],"container-title":["Cognitive Vehicular Networks"],"original-title":[],"language":"en","deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T13:15:57Z","timestamp":1718370957000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1201\/b19351-12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,16]]},"ISBN":["9781498721912","9781498721929"],"references-count":58,"alternative-id":["10.1201\/b19351-12","10.1201\/b19351"],"URL":"https:\/\/doi.org\/10.1201\/b19351-12","relation":{},"subject":[],"published":{"date-parts":[[2016,2,16]]}}}