{"id":"https://openalex.org/W2103982743","doi":"https://doi.org/10.1145/2517968.2517971","title":"POPCORN","display_name":"POPCORN","publication_year":2013,"publication_date":"2013-11-04","ids":{"openalex":"https://openalex.org/W2103982743","doi":"https://doi.org/10.1145/2517968.2517971","mag":"2103982743"},"language":"en","primary_location":{"id":"doi:10.1145/2517968.2517971","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2517968.2517971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM workshop on Security, privacy &amp; dependability for cyber vehicles","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025771714","display_name":"Christina H\u00f6fer","orcid":"https://orcid.org/0000-0002-0315-5468"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Christina H\u00f6fer","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103533806","display_name":"Jonathan Petit","orcid":"https://orcid.org/0000-0002-8644-1442"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jonathan Petit","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082122346","display_name":"Robert Schmidt","orcid":"https://orcid.org/0000-0001-7428-2408"},"institutions":[{"id":"https://openalex.org/I4210162709","display_name":"Denso (Germany)","ror":"https://ror.org/05xtrfa17","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210132650","https://openalex.org/I4210162709"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Robert Schmidt","raw_affiliation_strings":["DENSO AUTOMOTIVE Deutschland GmbH, Eching, Germany","DENSO Automotive Deutschland GmbH, Eching, Germany"],"affiliations":[{"raw_affiliation_string":"DENSO AUTOMOTIVE Deutschland GmbH, Eching, Germany","institution_ids":["https://openalex.org/I4210162709"]},{"raw_affiliation_string":"DENSO Automotive Deutschland GmbH, Eching, Germany","institution_ids":["https://openalex.org/I4210162709"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050897976","display_name":"Frank Kargl","orcid":"https://orcid.org/0000-0003-3800-8369"},"institutions":[{"id":"https://openalex.org/I196349391","display_name":"Universit\u00e4t Ulm","ror":"https://ror.org/032000t02","country_code":"DE","type":"education","lineage":["https://openalex.org/I196349391"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Frank Kargl","raw_affiliation_strings":["University of Ulm, Ulm, Germany"],"affiliations":[{"raw_affiliation_string":"University of Ulm, Ulm, Germany","institution_ids":["https://openalex.org/I196349391"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025771714"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":4.9424,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.95074996,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7348365187644958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6872634291648865},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6171391010284424},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5731677412986755},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.549297571182251},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.5029537081718445},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.4833888113498688},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.47937873005867004},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4403042793273926},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.41459861397743225},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2719177007675171},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09004920721054077},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07762691378593445}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7348365187644958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6872634291648865},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6171391010284424},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5731677412986755},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.549297571182251},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.5029537081718445},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.4833888113498688},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.47937873005867004},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4403042793273926},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.41459861397743225},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2719177007675171},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09004920721054077},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07762691378593445},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2517968.2517971","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2517968.2517971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM workshop on Security, privacy &amp; dependability for cyber vehicles","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/c5e36fcc-eee3-41ea-9cd9-be08831f285f","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/c5e36fcc-eee3-41ea-9cd9-be08831f285f","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"H\u00f6fer, C, Petit, J, Schmidt, R K & Kargl, F 2013, POPCORN: privacy-preserving charging for eMobility. in First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (ACM CCS 2013). Association for Computing Machinery, New York, pp. 37-48, First International Academic Workshop on Security, Privacy and Dependability for CyberVehicles, CyCar 2013, Berlin, Germany, 4/11/13. https://doi.org/10.1145/2517968.2517971","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/c5e36fcc-eee3-41ea-9cd9-be08831f285f","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G3981126665","display_name":null,"funder_award_id":"Seventh Framework Programme","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7995289818","display_name":"Preparing Secure Vehicle-to-X Communication Systems","funder_award_id":"269994","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1435638211","https://openalex.org/W2033820870","https://openalex.org/W2172174332"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W3022067003"],"abstract_inverted_index":{"Upcoming":[0],"years":[1],"will":[2,18,24],"see":[3],"a":[4,95,121,129,153,161,178],"massive":[5],"deployment":[6],"of":[7,14,30,82,94,107,156,163,173,182],"electric":[8,164],"vehicles":[9],"and,":[10],"combined":[11],"with":[12,123],"this,":[13],"charging":[15,43,88,167],"infrastructure.":[16],"This":[17],"require":[19],"protocols":[20],"and":[21,28,45,85,89,166,176,184],"standards":[22],"that":[23,37,139,169],"control":[25],"authentication,":[26],"authorization,":[27],"billing":[29],"electric-vehicle":[31],"charging.":[32],"The":[33],"ISO/IEC":[34,83,148],"15118":[35,84],"protocol":[36,109,142],"addresses":[38],"the":[39,42,46,79,86,108,134,146,171],"communication":[40],"between":[41],"station":[44,168],"vehicle":[47,165],"is":[48],"going":[49],"to":[50,118,120,132,136,145],"play":[51],"an":[52],"important":[53],"role,":[54],"at":[55],"least":[56],"in":[57,72],"Europe.":[58],"While":[59],"it":[60],"foresees":[61],"security":[62],"protection,":[63],"there":[64],"are":[65],"no":[66],"significant":[67],"mechanisms":[68],"for":[69],"privacy":[70,80,125,137],"protection":[71,81,138],"place.":[73],"In":[74],"this":[75,102],"paper,":[76],"we":[77,103],"investigate":[78],"surrounding":[87],"payment":[90],"infrastructure":[91],"by":[92],"means":[93],"Privacy":[96,112],"Impact":[97],"Assessment":[98],"(PIA).":[99],"Based":[100],"on":[101,160],"propose":[104],"modular":[105],"extensions":[106],"applying":[110],"state-of-the-art":[111],"Enhancing":[113],"Technologies":[114],"like":[115],"anonymous":[116],"credentials":[117],"come":[119],"system":[122,158],"maximum":[124],"protection.":[126],"We":[127,150],"conducted":[128],"second":[130],"PIA":[131],"show":[133],"benefits":[135],"our":[140,157,174],"POPCORN":[141],"provides":[143],"compared":[144],"original":[147],"15118.":[149],"also":[151],"describe":[152],"proof-of-concept":[154],"implementation":[155],"based":[159],"model":[162],"shows":[170],"feasibility":[172],"approach":[175],"allows":[177],"first":[179],"preliminary":[180],"analysis":[181],"performance":[183],"other":[185],"issues.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2016-06-24T00:00:00"}
