{"id":"https://openalex.org/W940696106","doi":"https://doi.org/10.1007/978-3-642-32281-5_35","title":"RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs","display_name":"RGH: An Efficient RSU-Aided Group-Based Hierarchical Privacy Enhancement Protocol for VANETs","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W940696106","doi":"https://doi.org/10.1007/978-3-642-32281-5_35","mag":"940696106"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-32281-5_35","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-32281-5_35","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062706107","display_name":"Tao Yang","orcid":"https://orcid.org/0000-0002-5180-2316"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tao Yang","raw_affiliation_strings":["MoE Key Lab of Computer Networks and Information Security, Peking University, 100871, Beijing, China","MoE Key Lab of High Confidence Software Technologies, Peking University, 100871, Beijing, China","School of Electronics Engineering and Computer Science, Peking University, 100871, Beijing, China"],"affiliations":[{"raw_affiliation_string":"MoE Key Lab of Computer Networks and Information Security, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"MoE Key Lab of High Confidence Software Technologies, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041717186","display_name":"Lingbo Kong","orcid":"https://orcid.org/0000-0002-6067-3763"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingbo Kong","raw_affiliation_strings":["School of Software Engineering, Beijing Jiaotong University, 100044, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing Jiaotong University, 100044, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079812452","display_name":"Liangwen Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangwen Yu","raw_affiliation_strings":["MoE Key Lab of Computer Networks and Information Security, Peking University, 100871, Beijing, China","MoE Key Lab of High Confidence Software Technologies, Peking University, 100871, Beijing, China","School of Electronics Engineering and Computer Science, Peking University, 100871, Beijing, China"],"affiliations":[{"raw_affiliation_string":"MoE Key Lab of Computer Networks and Information Security, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"MoE Key Lab of High Confidence Software Technologies, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113779390","display_name":"Jianbin Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbin Hu","raw_affiliation_strings":["MoE Key Lab of High Confidence Software Technologies, Peking University, 100871, Beijing, China"],"affiliations":[{"raw_affiliation_string":"MoE Key Lab of High Confidence Software Technologies, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101503012","display_name":"Zhong Chen","orcid":"https://orcid.org/0000-0001-7513-3981"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Chen","raw_affiliation_strings":["MoE Key Lab of Computer Networks and Information Security, Peking University, 100871, Beijing, China","MoE Key Lab of High Confidence Software Technologies, Peking University, 100871, Beijing, China","School of Electronics Engineering and Computer Science, Peking University, 100871, Beijing, China"],"affiliations":[{"raw_affiliation_string":"MoE Key Lab of Computer Networks and Information Security, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"MoE Key Lab of High Confidence Software Technologies, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, 100871, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062706107"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14810221,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"352","last_page":"362"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8121103048324585},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.7605670690536499},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.732888400554657},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6464980840682983},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5488631129264832},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5334907174110413},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5134276151657104},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5125710964202881},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4502793550491333},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.43343406915664673},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21420976519584656},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1347021758556366},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08167627453804016},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06979414820671082}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8121103048324585},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.7605670690536499},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.732888400554657},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6464980840682983},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5488631129264832},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5334907174110413},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5134276151657104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5125710964202881},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4502793550491333},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.43343406915664673},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21420976519584656},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1347021758556366},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08167627453804016},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06979414820671082},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-32281-5_35","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-32281-5_35","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1985392579","https://openalex.org/W2018468667","https://openalex.org/W2103056119","https://openalex.org/W2121247918","https://openalex.org/W2122991569","https://openalex.org/W2123830234","https://openalex.org/W2153098630","https://openalex.org/W2498149115","https://openalex.org/W2911424200","https://openalex.org/W4205092462","https://openalex.org/W4254037431"],"related_works":["https://openalex.org/W4235785488","https://openalex.org/W2123808758","https://openalex.org/W2898075319","https://openalex.org/W1868580136","https://openalex.org/W1998865180","https://openalex.org/W1535255904","https://openalex.org/W2893750591","https://openalex.org/W2154955022","https://openalex.org/W2792368265","https://openalex.org/W2060456500"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
