{"id":"https://openalex.org/W1980303100","doi":"https://doi.org/10.1109/medhocnet.2010.5546877","title":"Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption","display_name":"Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W1980303100","doi":"https://doi.org/10.1109/medhocnet.2010.5546877","mag":"1980303100"},"language":"en","primary_location":{"id":"doi:10.1109/medhocnet.2010.5546877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/medhocnet.2010.5546877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023707965","display_name":"Nanxi Chen","orcid":"https://orcid.org/0000-0002-8061-2343"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Nanxi Chen","raw_affiliation_strings":["Department of Computer Science, University of California, Los Angeles, USA","[Department of Computer Science, University of California, Los Angeles]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Los Angeles, USA","institution_ids":["https://openalex.org/I161318765"]},{"raw_affiliation_string":"[Department of Computer Science, University of California, Los Angeles]","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059529956","display_name":"M\u00e1rio Gerla","orcid":null},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mario Gerla","raw_affiliation_strings":["Department of Computer Science, University of California, Los Angeles, USA","[Department of Computer Science, University of California, Los Angeles]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Los Angeles, USA","institution_ids":["https://openalex.org/I161318765"]},{"raw_affiliation_string":"[Department of Computer Science, University of California, Los Angeles]","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003921452","display_name":"Dijiang Huang","orcid":"https://orcid.org/0000-0003-3257-6349"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dijiang Huang","raw_affiliation_strings":["Department of Computer Science and Engineering, Arizona State University, USA","Department of Computer Science and Eng., Arizona State University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Arizona State University, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Department of Computer Science and Eng., Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102002672","display_name":"Xiaoyan Hong","orcid":"https://orcid.org/0000-0002-0745-5038"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hong","raw_affiliation_strings":["Department of Computer Science, University of Alabama, USA","[Department of Computer Science, University of Alabama]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Alabama, USA","institution_ids":["https://openalex.org/I17301866"]},{"raw_affiliation_string":"[Department of Computer Science, University of Alabama]","institution_ids":["https://openalex.org/I17301866"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023707965"],"corresponding_institution_ids":["https://openalex.org/I161318765"],"apc_list":null,"apc_paid":null,"fwci":5.8636,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.95847741,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2139","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7524990439414978},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6903678774833679},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.6623188257217407},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5705156922340393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3537532091140747},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20297616720199585}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7524990439414978},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6903678774833679},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.6623188257217407},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5705156922340393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3537532091140747},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20297616720199585}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/medhocnet.2010.5546877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/medhocnet.2010.5546877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1569083856","https://openalex.org/W1965455100","https://openalex.org/W2108072891","https://openalex.org/W2114902045","https://openalex.org/W2126375161","https://openalex.org/W2134900464","https://openalex.org/W2138001464","https://openalex.org/W2141420453","https://openalex.org/W2152924492","https://openalex.org/W2160608575","https://openalex.org/W6629862473","https://openalex.org/W6634010886","https://openalex.org/W6671828919","https://openalex.org/W6676054806"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2053797511","https://openalex.org/W2001743975","https://openalex.org/W2390279801","https://openalex.org/W3028989581","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2241036517","https://openalex.org/W2376932109"],"abstract_inverted_index":{"Ciphertext-policy":[0],"attribute-based":[1],"encryption":[2],"(CP-ABE)":[3],"provides":[4],"an":[5,20],"encrypted":[6],"access":[7,21],"control":[8,22],"mechanism":[9],"for":[10,49,114],"broadcasting":[11],"messages.":[12],"Basically,":[13],"a":[14,17],"sender":[15],"encrypts":[16],"message":[18,37],"with":[19,127],"policy":[23,43],"tree":[24],"which":[25,79,96],"is":[26,65,80],"logically":[27],"composed":[28],"of":[29],"attributes;":[30],"receivers":[31],"are":[32],"able":[33],"to":[34,103],"decrypt":[35],"the":[36,42,50,75,84,118],"when":[38],"their":[39],"attributes":[40,47,61,98],"satisfy":[41],"tree.":[44],"A":[45,56],"user's":[46],"stand":[48],"properties":[51],"that":[52],"he":[53],"currently":[54],"owns.":[55],"user":[57],"should":[58],"keep":[59],"his":[60],"up-to-date.":[62],"However,":[63],"this":[64,90],"not":[66],"easy":[67],"in":[68],"CP-ABE":[69,128],"because":[70],"whenever":[71],"one":[72],"attribute":[73,106],"changes,":[74],"entire":[76],"private":[77],"key,":[78],"based":[81],"on":[82],"all":[83],"attributes,":[85],"must":[86],"be":[87],"changed.":[88],"In":[89],"paper,":[91],"we":[92],"introduce":[93],"fading":[94,112,115],"function,":[95],"renders":[97],"\u201cdynamic\u201d":[99],"and":[100,120,129],"allows":[101],"users":[102],"update":[104],"each":[105],"separately.":[107],"We":[108,122],"study":[109],"how":[110],"choosing":[111],"rate":[113],"function":[116],"affects":[117],"efficiency":[119],"security.":[121],"also":[123],"compare":[124],"our":[125,131],"design":[126],"find":[130],"scheme":[132],"performs":[133],"significantly":[134],"better":[135],"under":[136],"certain":[137],"circumstance.":[138]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
