{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:29Z","timestamp":1738777229859,"version":"3.37.0"},"reference-count":15,"publisher":"Academy Publisher","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.8.2239-2244","type":"journal-article","created":{"date-parts":[[2014,8,8]],"date-time":"2014-08-08T01:04:11Z","timestamp":1407459851000},"source":"Crossref","is-referenced-by-count":2,"title":["An Effective Scheme for Location Privacy in VANETs"],"prefix":"10.4304","volume":"9","author":[{"given":"Xingjun","family":"Shi","sequence":"first","affiliation":[]},{"given":"Huibin","family":"Xu","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,8,7]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2164068"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.02.008"},{"key":"ref4","first-page":"123","article-title":"A security architecture concept for vehicular network nodes","volume-title":"International Conference on Information Communications Signal Processing","author":"Eichler","year":"2007","unstructured":"[7] S. Eichler. A security architecture concept for vehicular network nodes, in International Conference on Information, Communications Signal Processing, December 2007 pp. 123-132."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"ref6","first-page":"90","article-title":"Private Queries in Location Based Services: Anonymizers are not Necessary.","volume-title":"Proc ACM SIGMOD Int l Conf Management of Data (SIGMOD 08)","author":"Ghinita","year":"2008","unstructured":"[10] G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan. Private Queries in Location Based Services: Anonymizers are not Necessary. Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '08), 2008 pp. 90-97."},{"issue":"4","key":"ref7","first-page":"159","article-title":"Decorrelating Wireless Sensor Network Traffic to Inhibit Traffic Analysis Attacks. Pervasive and Mobile Computing J.","volume":"2","author":"Deng","year":"2006","unstructured":"[12] J. Deng, R. Han, and S. Mishra. Decorrelating Wireless Sensor Network Traffic to Inhibit Traffic Analysis Attacks. Pervasive and Mobile Computing J., Special Issue on Security in Wireless Mobile Computing Systems, 2006, 2(4) pp. 159-186.","journal-title":"Special Issue on Security in Wireless Mobile Computing Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"ref9","first-page":"123","article-title":"Location Privacy in Pervasive Comput.","author":"Beresford","year":"2003","unstructured":"[15] A. R. Beresford and F. Stajano. Location Privacy in Pervasive Comput. IEEE Pervasive Computing, 2003 pp. 123-132.","journal-title":"IEEE Pervasive Comput","ISSN":"https:\/\/id.crossref.org\/issn\/1536-1268","issn-type":"print"},{"key":"ref10","first-page":"2699","article-title":"Wireless Location Privacy Protection in Vehicular Ad-hoc Networks.","volume-title":"Proceedings of ICC","author":"Song","year":"2009","unstructured":"[16] J. -H. Song, V. W. S. Wong, and V. C. M. Leung. Wireless Location Privacy Protection in Vehicular Ad-hoc Networks. In Proceedings of ICC, 2009 pp. 2699-2704."},{"key":"ref11","first-page":"23","article-title":"Towards Statistically Strong Source Anonymity for Sensor Networks.","author":"Shao","year":"2008","unstructured":"[17] M. Shao, Y. Yang, S. Zhu, and G. Cao. Towards Statistically Strong Source Anonymity for Sensor Networks. Proc. IEEE INFOCOM, 2008 pp. 23-30.","journal-title":"Proc IEEE INFOCOM","ISSN":"https:\/\/id.crossref.org\/issn\/0743-166X","issn-type":"print"},{"key":"ref12","first-page":"1187","article-title":"Enhancing wireless location privacy using silent period. in Proc.","volume-title":"IEEE Wireless Communications and Networking Conference(WCNC)","volume":"2","author":"Huang","year":"2005","unstructured":"[18] L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Enhancing wireless location privacy using silent period. in Proc. 2005 IEEE Wireless Communications and Networking Conference(WCNC), vol. 2, New Orleans, LA USA, Mar. 2005 pp. 1187-1192."},{"key":"ref13","first-page":"648","article-title":"Effectively changing pseudonyms for privacy protection in vanets. in Proc.","volume-title":"10th International Symposium on Pervasive Systems Algorithms and Networks","author":"Liao","year":"2009","unstructured":"[19] J. Liao and J. Li. Effectively changing pseudonyms for privacy protection in vanets. in Proc. 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks, Taiwan, Dec. 2009 pp. 648-652"},{"key":"ref14","first-page":"23","article-title":"andY. FangAn id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks.","volume-title":"IEEE Military Communications Conference","author":"Sun","year":"2007","unstructured":"[20] J. Sun, C. Zhang, andY. FangAn id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In IEEE Military Communications Conference, October 2007 pp. 23-31."},{"issue":"1","key":"ref15","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TVT.2011.2162864","article-title":"Pseudonym changing at social spots: an effective strategy for location privacy in VANETs.","volume":"61","author":"Lu","year":"2012","unstructured":"[22] Rongxing Lu, Xiaodong Lin, Tom H. Luan, Xiaohui Liang. Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE transactions on vehicular technology, 2012, 61(1) pp. 34-45","journal-title":"IEEE Trans Vehicular Technol","ISSN":"https:\/\/id.crossref.org\/issn\/0018-9545","issn-type":"print"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:07:42Z","timestamp":1738775262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,7]]},"references-count":15,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2014,8,7]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.8.2239-2244","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,8,7]]}}}