{"id":"https://openalex.org/W2911449599","doi":"https://doi.org/10.1109/comnet.2018.8622289","title":"Towards the Optimization of a Ticket-based Authentication Scheme for VANETs","display_name":"Towards the Optimization of a Ticket-based Authentication Scheme for VANETs","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2911449599","doi":"https://doi.org/10.1109/comnet.2018.8622289","mag":"2911449599"},"language":"en","primary_location":{"id":"doi:10.1109/comnet.2018.8622289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comnet.2018.8622289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Seventh International Conference on Communications and Networking (ComNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035301863","display_name":"Ons Chikhaoui","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Ons Chikhaoui","raw_affiliation_strings":["Digital Security Research Lab Higher School of Communications of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","Digital Security Research Lab Higher School of Communications of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communications of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communications of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002751739","display_name":"Aida Ben Chehida Douss","orcid":"https://orcid.org/0000-0002-4664-4800"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Aida Ben Chehida Douss","raw_affiliation_strings":["Digital Security Research Lab Higher School of Communications of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","Digital Security Research Lab Higher School of Communications of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communications of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communications of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038170181","display_name":"Ryma Abassi","orcid":"https://orcid.org/0000-0003-2148-7965"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Ryma Abassi","raw_affiliation_strings":["Digital Security Research Lab Higher School of Communications of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","Digital Security Research Lab Higher School of Communications of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communications of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communications of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003015498","display_name":"Sihem Guemara El Fatmi","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Sihem Guemara El Fatmi","raw_affiliation_strings":["Digital Security Research Lab Higher School of Communications of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","Digital Security Research Lab Higher School of Communications of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communications of Tunis (Sup\u2019Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"Digital Security Research Lab Higher School of Communications of Tunis (Sup'Com), University of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035301863"],"corresponding_institution_ids":["https://openalex.org/I179097149"],"apc_list":null,"apc_paid":null,"fwci":0.1288,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51828092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3027","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ticket","display_name":"Ticket","score":0.8458852767944336},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7934399843215942},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6753862500190735},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6482473611831665},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6098484396934509},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5471051335334778},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5162491798400879},{"id":"https://openalex.org/keywords/group-signature","display_name":"Group signature","score":0.49462029337882996},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.48594558238983154},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4700552225112915},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4567417502403259},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.43762025237083435},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4295656085014343},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.41807520389556885},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.14763760566711426},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13459375500679016},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11192262172698975}],"concepts":[{"id":"https://openalex.org/C2776540713","wikidata":"https://www.wikidata.org/wiki/Q7800647","display_name":"Ticket","level":2,"score":0.8458852767944336},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7934399843215942},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6753862500190735},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6482473611831665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6098484396934509},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5471051335334778},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5162491798400879},{"id":"https://openalex.org/C148408913","wikidata":"https://www.wikidata.org/wiki/Q5611269","display_name":"Group signature","level":4,"score":0.49462029337882996},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.48594558238983154},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4700552225112915},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4567417502403259},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.43762025237083435},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4295656085014343},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.41807520389556885},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.14763760566711426},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13459375500679016},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11192262172698975},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comnet.2018.8622289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comnet.2018.8622289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Seventh International Conference on Communications and Networking (ComNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1600495091","https://openalex.org/W1667889362","https://openalex.org/W2004121843","https://openalex.org/W2007557502","https://openalex.org/W2108834246","https://openalex.org/W2131409630","https://openalex.org/W2183656025","https://openalex.org/W2588737662","https://openalex.org/W2755422776","https://openalex.org/W6651459189","https://openalex.org/W7051779911"],"related_works":["https://openalex.org/W132856376","https://openalex.org/W2100005297","https://openalex.org/W1611423412","https://openalex.org/W1542603702","https://openalex.org/W2080723908","https://openalex.org/W2330330779","https://openalex.org/W2118200228","https://openalex.org/W2011423695","https://openalex.org/W858950778","https://openalex.org/W2185872751"],"abstract_inverted_index":{"Vehicular":[0],"Ad":[1],"hoc":[2],"NETworks":[3],"(VANETs)":[4],"mainly":[5],"intend":[6],"to":[7,18,29,32,86,154],"increase":[8],"road":[9],"safety":[10,13],"by":[11,178],"exchanging":[12],"related":[14],"messages.":[15],"In":[16,140,159],"order":[17,153],"provide":[19],"a":[20,25,48,68,72,125],"secure":[21],"communication":[22],"in":[23,67,80,91,152],"VANETs,":[24],"key":[26],"requirement":[27],"is":[28,102,188],"enable":[30],"receivers":[31],"authenticate":[33],"received":[34],"messages":[35],"while":[36,94],"preserving":[37,78],"the":[38,41,60,92,115,156,161,185],"privacy":[39],"of":[40,43,147],"identities":[42],"sending":[44],"vehicles.":[45],"However,":[46],"if":[47],"misbehavior":[49],"takes":[50],"place,":[51],"involved":[52],"vehicles":[53,82,90,180],"should":[54,117],"be":[55,118],"identified":[56],"and":[57,110,133,168,184],"evicted":[58],"from":[59],"network.":[61],"To":[62],"this":[63,141],"end,":[64],"we":[65,143],"proposed":[66,150],"previous":[69],"work":[70,151],"[1]":[71],"ticket-based":[73],"authentication":[74],"scheme":[75],"for":[76,181],"VANETs":[77],"privacy,":[79],"which":[81],"use":[83],"temporary":[84],"tickets":[85,175],"communicate":[87],"with":[88],"other":[89],"network":[93],"conditionally":[95],"maintaining":[96],"their":[97],"privacy.":[98],"A":[99],"vehicle's":[100],"ticket":[101,116],"formed":[103],"through":[104],"two":[105],"stages:":[106],"an":[107,111,145],"offline":[108],"stage":[109],"online":[112],"stage.":[113],"Besides,":[114],"updated":[119],"whenever":[120,135],"its":[121,136],"vehicle":[122],"enters":[123],"into":[124],"new":[126],"domain":[127],"(containing":[128],"few":[129],"Road":[130],"Side":[131],"Units),":[132],"modified":[134],"validity":[137],"period":[138],"expires.":[139],"paper,":[142],"propose":[144],"optimization":[146],"that":[148],"previously":[149],"decrease":[155],"cryptographic":[157],"delay.":[158],"fact,":[160],"Identity":[162],"Based":[163],"Online/Offline":[164],"Signature":[165],"(IBOOS)":[166],"technique":[167],"Shamir's":[169],"trick":[170],"are":[171,176],"introduced,":[172],"already":[173],"verified":[174],"stored":[177],"receiving":[179],"reference":[182],"later":[183],"signature":[186],"size":[187],"reduced.":[189]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
