{"id":"https://openalex.org/W2892043723","doi":"https://doi.org/10.1007/978-3-030-00012-7_12","title":"Modeling and Analysis of a Hybrid Authentication Protocol for VANET","display_name":"Modeling and Analysis of a Hybrid Authentication Protocol for VANET","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2892043723","doi":"https://doi.org/10.1007/978-3-030-00012-7_12","mag":"2892043723"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-00012-7_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-00012-7_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100729477","display_name":"Yang Xu","orcid":"https://orcid.org/0000-0001-6870-2824"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Xu","raw_affiliation_strings":["Guiyang Public Security Bureau Joint Research Centre for Information Security, Guizhou Normal University, Guiyang, 550001, Guizhou, China","Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, 550001, Guizhou, China"],"affiliations":[{"raw_affiliation_string":"Guiyang Public Security Bureau Joint Research Centre for Information Security, Guizhou Normal University, Guiyang, 550001, Guizhou, China","institution_ids":["https://openalex.org/I154893126"]},{"raw_affiliation_string":"Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, 550001, Guizhou, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103247917","display_name":"Ziwang Wang","orcid":"https://orcid.org/0000-0003-3027-7003"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziwang Wang","raw_affiliation_strings":["Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, 550001, Guizhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, 550001, Guizhou, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101693174","display_name":"Lei Huang","orcid":"https://orcid.org/0000-0002-9386-9359"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Huang","raw_affiliation_strings":["Guiyang Public Security Bureau Joint Research Centre for Information Security, Guizhou Normal University, Guiyang, 550001, Guizhou, China"],"affiliations":[{"raw_affiliation_string":"Guiyang Public Security Bureau Joint Research Centre for Information Security, Guizhou Normal University, Guiyang, 550001, Guizhou, China","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023485894","display_name":"Xiaoyao Xie","orcid":"https://orcid.org/0000-0003-4545-8480"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyao Xie","raw_affiliation_strings":["Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, 550001, Guizhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, 550001, Guizhou, China","institution_ids":["https://openalex.org/I154893126"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100729477"],"corresponding_institution_ids":["https://openalex.org/I154893126"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15965925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"123","last_page":"137"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.9124700427055359},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8395549654960632},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6830558180809021},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6655769348144531},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6300407648086548},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.6113889813423157},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5962761044502258},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5463427305221558},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5424076318740845},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5163261294364929},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.47768718004226685},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.47654420137405396},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4515848755836487},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32843247056007385},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2899957299232483},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.2236410677433014},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.18432116508483887},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10690638422966003},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06638818979263306}],"concepts":[{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.9124700427055359},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8395549654960632},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6830558180809021},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6655769348144531},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6300407648086548},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.6113889813423157},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5962761044502258},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5463427305221558},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5424076318740845},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5163261294364929},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.47768718004226685},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.47654420137405396},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4515848755836487},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32843247056007385},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2899957299232483},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.2236410677433014},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.18432116508483887},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10690638422966003},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06638818979263306},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-00012-7_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-00012-7_12","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1217034487","https://openalex.org/W1482268673","https://openalex.org/W1833322956","https://openalex.org/W1890412134","https://openalex.org/W1944419075","https://openalex.org/W2019269876","https://openalex.org/W2074149673","https://openalex.org/W2086596492","https://openalex.org/W2091794203","https://openalex.org/W2092456987","https://openalex.org/W2103056119","https://openalex.org/W2121247918","https://openalex.org/W2137237442","https://openalex.org/W2160152944","https://openalex.org/W2167552905","https://openalex.org/W2167872556","https://openalex.org/W2170290823","https://openalex.org/W2172174332","https://openalex.org/W2278507260","https://openalex.org/W2398027415","https://openalex.org/W2611599570","https://openalex.org/W6695193772"],"related_works":["https://openalex.org/W2762327599","https://openalex.org/W2562351376","https://openalex.org/W2555010610","https://openalex.org/W858950778","https://openalex.org/W2373411624","https://openalex.org/W2353466842","https://openalex.org/W1971410744","https://openalex.org/W3151240493","https://openalex.org/W2018052023","https://openalex.org/W2363950137"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
