{"id":"https://openalex.org/W3016542125","doi":"https://doi.org/10.1007/978-3-030-44322-1_29","title":"A Formal Environment for Credibility and Accuracy Assessment of Safety Messages Exchanged in VANETs","display_name":"A Formal Environment for Credibility and Accuracy Assessment of Safety Messages Exchanged in VANETs","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3016542125","doi":"https://doi.org/10.1007/978-3-030-44322-1_29","mag":"3016542125"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-44322-1_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-44322-1_29","pdf_url":null,"source":{"id":"https://openalex.org/S4210177767","display_name":"Lecture notes in business information processing","issn_l":"1865-1348","issn":["1865-1348","1865-1356"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Business Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035301863","display_name":"Ons Chikhaoui","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Ons Chikhaoui","raw_affiliation_strings":["Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002751739","display_name":"Aida Ben Chehida Douss","orcid":"https://orcid.org/0000-0002-4664-4800"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Aida Ben Chehida Douss","raw_affiliation_strings":["Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038170181","display_name":"Ryma Abassi","orcid":"https://orcid.org/0000-0003-2148-7965"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Ryma Abassi","raw_affiliation_strings":["Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003015498","display_name":"Sihem Guemara El Fatmi","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Sihem Guemara El Fatmi","raw_affiliation_strings":["Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab, Higher School of Communication of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035301863"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05535463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"391","last_page":"402"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.9496886730194092},{"id":"https://openalex.org/keywords/completeness","display_name":"Completeness (order theory)","score":0.8361769914627075},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.8080710172653198},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7695466876029968},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6474321484565735},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.5615649223327637},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.530974268913269},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40510761737823486},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17613911628723145},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15687516331672668},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07359570264816284}],"concepts":[{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.9496886730194092},{"id":"https://openalex.org/C17231256","wikidata":"https://www.wikidata.org/wiki/Q5156540","display_name":"Completeness (order theory)","level":2,"score":0.8361769914627075},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.8080710172653198},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7695466876029968},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6474321484565735},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.5615649223327637},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.530974268913269},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40510761737823486},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17613911628723145},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15687516331672668},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07359570264816284},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-44322-1_29","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-44322-1_29","pdf_url":null,"source":{"id":"https://openalex.org/S4210177767","display_name":"Lecture notes in business information processing","issn_l":"1865-1348","issn":["1865-1348","1865-1356"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Business Information Processing","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1598822623","https://openalex.org/W2296068804","https://openalex.org/W2771817079","https://openalex.org/W2886180403","https://openalex.org/W2969950618"],"related_works":["https://openalex.org/W13634261","https://openalex.org/W56937029","https://openalex.org/W3163509751","https://openalex.org/W958050847","https://openalex.org/W2396405675","https://openalex.org/W175051304","https://openalex.org/W1548499332","https://openalex.org/W1549730417","https://openalex.org/W1994524667","https://openalex.org/W4233421640"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
