{"id":"https://openalex.org/W4391742835","doi":"https://doi.org/10.1109/icct59356.2023.10419648","title":"Cross-domain Identity Authentication in IoV","display_name":"Cross-domain Identity Authentication in IoV","publication_year":2023,"publication_date":"2023-10-20","ids":{"openalex":"https://openalex.org/W4391742835","doi":"https://doi.org/10.1109/icct59356.2023.10419648"},"language":"en","primary_location":{"id":"doi:10.1109/icct59356.2023.10419648","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct59356.2023.10419648","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 23rd International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102774387","display_name":"Ming Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Zhang","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101999891","display_name":"Yuhang Li","orcid":"https://orcid.org/0000-0002-1893-2530"},"institutions":[{"id":"https://openalex.org/I4210098616","display_name":"Chengdu Guoke Haibo Information Technology (China)","ror":"https://ror.org/0148z7881","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210098616"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhang Li","raw_affiliation_strings":["Chengdu Ruixinan Information Security Technology Co.,Ltd,Evaluation Division,Chengdu,China","Sichuan Electronic Information Industry Technology Research Institute Co., Ltd,Chengdu,China","Evaluation Division, Chengdu Ruixinan Information Security Technology Co.,Ltd, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Chengdu Ruixinan Information Security Technology Co.,Ltd,Evaluation Division,Chengdu,China","institution_ids":["https://openalex.org/I4210098616"]},{"raw_affiliation_string":"Sichuan Electronic Information Industry Technology Research Institute Co., Ltd,Chengdu,China","institution_ids":[]},{"raw_affiliation_string":"Evaluation Division, Chengdu Ruixinan Information Security Technology Co.,Ltd, Chengdu, China","institution_ids":["https://openalex.org/I4210098616"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113743523","display_name":"Yufan Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yufan Guo","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100688420","display_name":"Dan Liao","orcid":"https://orcid.org/0000-0003-3729-3612"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Liao","raw_affiliation_strings":["School of Information and Communication Engineering, University of Electronic Science and Technology of China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, University of Electronic Science and Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100633101","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-7206-1783"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["School of Aeronautics and Astronautics, University of Electronic Science and Technology of China,Chengdu,China","School of Aeronautics and Astronautics, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Aeronautics and Astronautics, University of Electronic Science and Technology of China,Chengdu,China","institution_ids":["https://openalex.org/I9842412","https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Aeronautics and Astronautics, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100748943","display_name":"Yujuan Li","orcid":"https://orcid.org/0000-0002-5736-6375"},"institutions":[{"id":"https://openalex.org/I4210098616","display_name":"Chengdu Guoke Haibo Information Technology (China)","ror":"https://ror.org/0148z7881","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210098616"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujuan Li","raw_affiliation_strings":["Chengdu Ruixinan Information Security Technology Co.,Ltd,Evaluation Division,Chengdu,China","Sichuan Electronic Information Industry Technology Research Institute Co., Ltd,Chengdu,China","Sichuan Electronic Information Industry Technology Research Institute Co., Ltd, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Chengdu Ruixinan Information Security Technology Co.,Ltd,Evaluation Division,Chengdu,China","institution_ids":["https://openalex.org/I4210098616"]},{"raw_affiliation_string":"Sichuan Electronic Information Industry Technology Research Institute Co., Ltd,Chengdu,China","institution_ids":[]},{"raw_affiliation_string":"Sichuan Electronic Information Industry Technology Research Institute Co., Ltd, Chengdu, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102774387"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.1339,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.48816816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"696","last_page":"701"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7868924140930176},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7521816492080688},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6803298592567444},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.6112448573112488},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.6034812331199646},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5850560069084167},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5680999159812927},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5403414964675903},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5343745350837708},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5179821252822876},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4464605450630188},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.4375791549682617},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1973493993282318}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7868924140930176},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7521816492080688},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6803298592567444},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.6112448573112488},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.6034812331199646},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5850560069084167},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5680999159812927},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5403414964675903},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5343745350837708},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5179821252822876},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4464605450630188},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.4375791549682617},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1973493993282318},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icct59356.2023.10419648","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icct59356.2023.10419648","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 23rd International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.4099999964237213,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G7006313206","display_name":null,"funder_award_id":"61971105","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2021516337","https://openalex.org/W2909485178","https://openalex.org/W2964635667","https://openalex.org/W2980828401","https://openalex.org/W3010858269","https://openalex.org/W3011989826","https://openalex.org/W3033029514","https://openalex.org/W3195696782","https://openalex.org/W4214696809","https://openalex.org/W4292969453","https://openalex.org/W4319983517"],"related_works":["https://openalex.org/W798404019","https://openalex.org/W2397761024","https://openalex.org/W2144373733","https://openalex.org/W2156712281","https://openalex.org/W1984916066","https://openalex.org/W2134444393","https://openalex.org/W4234011401","https://openalex.org/W1949088485","https://openalex.org/W2116285675","https://openalex.org/W2061637199"],"abstract_inverted_index":{"To":[0],"address":[1],"the":[2,23,30,48,58,65,70,73,80,85,90,94],"problems":[3],"of":[4,39,75,93,98],"identity":[5,18,67,77,81],"forgery":[6,82],"attack":[7],"and":[8,37,54,78,101],"low":[9],"authentication":[10,19,45,60,76,102],"efficiency,":[11],"this":[12],"paper":[13],"proposes":[14],"a":[15],"cross-domain":[16,35,44,59],"vehicle":[17,40,66],"algorithm":[20,50],"based":[21],"on":[22],"master-slave":[24,31],"multi-chain,":[25],"called":[26],"CAMS.":[27],"It":[28,62],"utilizes":[29],"multi-chain":[32],"to":[33],"achieve":[34],"storage":[36],"sharing":[38],"data,":[41],"thereby":[42],"improving":[43],"efficiency.":[46,103],"Moreover,":[47],"CAMS":[49,95],"introduces":[51],"pseudonym":[52],"generation":[53],"verification":[55],"parameters":[56],"in":[57,96],"process.":[61],"further":[63],"verifies":[64],"before":[68],"verifying":[69],"message,":[71],"ensuring":[72],"anonymity":[74],"resisting":[79],"attack.":[83],"Finally,":[84],"simulation":[86],"results":[87],"show":[88],"that":[89],"superior":[91],"performance":[92],"terms":[97],"computational":[99],"overhead":[100]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
