{"id":"https://openalex.org/W2810571855","doi":"https://doi.org/10.1109/sahcn.2018.8397128","title":"FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways","display_name":"FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2810571855","doi":"https://doi.org/10.1109/sahcn.2018.8397128","mag":"2810571855"},"language":"en","primary_location":{"id":"doi:10.1109/sahcn.2018.8397128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2018.8397128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070132452","display_name":"Chen Lyu","orcid":"https://orcid.org/0000-0002-4373-9898"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen Lyu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101976682","display_name":"Amit Pande","orcid":"https://orcid.org/0000-0002-5898-3404"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amit Pande","raw_affiliation_strings":["Department of Computer Science, University of California, Davis, CA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Davis, CA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100320672","display_name":"Yuanyuan Zhang","orcid":"https://orcid.org/0000-0002-8632-5863"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086439160","display_name":"Prasant Mohapatra","orcid":"https://orcid.org/0000-0002-2768-5308"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prasant Mohapatra","raw_affiliation_strings":["Department of Computer Science, University of California, Davis, CA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Davis, CA","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5070132452"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.2575,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.56188025,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":96},"biblio":{"volume":"52","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9728000164031982,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8114187717437744},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.6717793345451355},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6348690390586853},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5734901428222656},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5434752106666565},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5371919274330139},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.530779242515564},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5257996916770935},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5001480579376221},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.4307842254638672},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3841402530670166},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08736103773117065},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.07876884937286377}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8114187717437744},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.6717793345451355},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6348690390586853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5734901428222656},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5434752106666565},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5371919274330139},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.530779242515564},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5257996916770935},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5001480579376221},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.4307842254638672},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3841402530670166},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08736103773117065},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.07876884937286377},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sahcn.2018.8397128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2018.8397128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W47938516","https://openalex.org/W147936182","https://openalex.org/W1635570947","https://openalex.org/W1655377165","https://openalex.org/W1892798954","https://openalex.org/W1967880185","https://openalex.org/W2017954997","https://openalex.org/W2035407669","https://openalex.org/W2038044720","https://openalex.org/W2050072803","https://openalex.org/W2059528890","https://openalex.org/W2066938247","https://openalex.org/W2081560760","https://openalex.org/W2093843066","https://openalex.org/W2095983617","https://openalex.org/W2099005886","https://openalex.org/W2099817583","https://openalex.org/W2107239999","https://openalex.org/W2128628587","https://openalex.org/W2166177812","https://openalex.org/W2166481425","https://openalex.org/W2243232214","https://openalex.org/W4255375128","https://openalex.org/W6601862067","https://openalex.org/W6605900128","https://openalex.org/W6636925352","https://openalex.org/W6663080945","https://openalex.org/W6674945332","https://openalex.org/W6690432497"],"related_works":["https://openalex.org/W4312703968","https://openalex.org/W798404019","https://openalex.org/W2397761024","https://openalex.org/W2166598691","https://openalex.org/W2144373733","https://openalex.org/W2156712281","https://openalex.org/W2892743407","https://openalex.org/W773319083","https://openalex.org/W2776010770","https://openalex.org/W2024091567"],"abstract_inverted_index":{"Connected":[0],"cars":[1,30,56],"have":[2],"received":[3],"massive":[4],"attention":[5],"in":[6,68,160],"Intelligent":[7],"Transportation":[8],"System.":[9],"Many":[10],"potential":[11],"services,":[12],"especially":[13],"safety-related":[14],"ones,":[15],"rely":[16,97],"on":[17,58,98,107,138],"spatial-temporal":[18,35,53,120,130],"messages":[19,36,131],"periodically":[20],"broadcast":[21],"by":[22,132],"cars.":[23,139],"Without":[24],"a":[25,43,78,134],"secure":[26],"authentication":[27,64,94],"algorithm,":[28],"malicious":[29],"may":[31,48],"send":[32],"out":[33],"invalid":[34],"and":[37,80,104,110,114,127,144,154,164],"then":[38],"deny":[39],"creating":[40],"them.":[41],"Meanwhile,":[42],"lot":[44],"of":[45,129,162],"private":[46],"information":[47],"be":[49,66],"disclosed":[50],"from":[51],"these":[52,88],"messages.":[54,121],"Since":[55],"move":[57],"expressways":[59],"at":[60],"high":[61],"speed,":[62],"any":[63],"must":[65],"performed":[67],"real-time":[69],"to":[70,86,92,117,147],"prevent":[71],"crashes.":[72],"In":[73,90],"this":[74],"paper,":[75],"we":[76],"propose":[77],"Fast":[79],"Anonymous":[81],"Spatial-Temporal":[82],"Trust":[83],"(FastTrust)":[84],"mechanism":[85],"ensure":[87],"properties.":[89,156],"contrast":[91],"most":[93],"protocols":[95],"which":[96],"fixed":[99],"infrastructures,":[100],"FastTrust":[101,122,150,157],"is":[102,115,158],"distributed":[103],"mostly":[105],"designed":[106],"symmetric-key":[108],"cryptography":[109],"an":[111],"entropy-based":[112],"commitment,":[113],"able":[116],"fast":[118],"authenticate":[119],"also":[123],"ensures":[124],"the":[125,152],"anonymity":[126],"unlinkability":[128],"developing":[133],"pseudonym-varying":[135],"scheduling":[136],"scheme":[137],"We":[140],"provide":[141],"both":[142],"analytical":[143],"simulation":[145],"evaluations":[146],"show":[148],"that":[149],"achieves":[151],"security":[153],"privacy":[155],"low-cost":[159],"terms":[161],"communication":[163],"computational":[165],"resources,":[166],"authenticating":[167],"20":[168],"times":[169],"faster":[170],"than":[171],"existing":[172],"Elliptic":[173],"Curve":[174],"Digital":[175],"Signature":[176],"Algorithm.":[177]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
