{"id":"https://openalex.org/W3120249339","doi":"https://doi.org/10.1145/3444370.3444619","title":"An improved secure and efficient certificateless conditional privacy-preserving authentication scheme in VANETs","display_name":"An improved secure and efficient certificateless conditional privacy-preserving authentication scheme in VANETs","publication_year":2020,"publication_date":"2020-12-04","ids":{"openalex":"https://openalex.org/W3120249339","doi":"https://doi.org/10.1145/3444370.3444619","mag":"3120249339"},"language":"en","primary_location":{"id":"doi:10.1145/3444370.3444619","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031611520","display_name":"Xiaodong Wang","orcid":"https://orcid.org/0000-0002-9451-6213"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaodong Wang","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112599527","display_name":"Wenxu Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenxu Jia","raw_affiliation_strings":["Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038446514","display_name":"Hua Qin","orcid":"https://orcid.org/0000-0002-4056-7154"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Qin","raw_affiliation_strings":["Information Technology Support Center, Beijing University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Information Technology Support Center, Beijing University of Technology, Beijing, China","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5031611520"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":null,"apc_paid":null,"fwci":0.6165,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.68855059,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"496","last_page":"503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9611999988555908,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9606000185012817,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7591931223869324},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7043923139572144},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6319632530212402},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6004738807678223},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5967792272567749},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.055133312940597534}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7591931223869324},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7043923139572144},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6319632530212402},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6004738807678223},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5967792272567749},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.055133312940597534},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3444370.3444619","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2023835067","https://openalex.org/W2036378739","https://openalex.org/W2137469879","https://openalex.org/W2586333888","https://openalex.org/W2792887462","https://openalex.org/W2794799331","https://openalex.org/W2905646440","https://openalex.org/W2918461235","https://openalex.org/W2998917854","https://openalex.org/W3127117604","https://openalex.org/W3142159151"],"related_works":["https://openalex.org/W2130966263","https://openalex.org/W2182202038","https://openalex.org/W2364411142","https://openalex.org/W2002455623","https://openalex.org/W3118704613","https://openalex.org/W2358850228","https://openalex.org/W4297092738","https://openalex.org/W1995124684","https://openalex.org/W2118981261","https://openalex.org/W2775429857"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"with":[3,151],"the":[4,13,22,29,32,35,44,52,56,69,77,107,128,140,152,161],"rapid":[5],"development":[6],"of":[7,15,34,79,109,131,142],"wireless":[8,16],"technology,":[9],"researchers":[10],"have":[11,42],"proposed":[12,74,103,125,156],"use":[14,89],"communication":[17,65,117,165],"network":[18,25],"technology":[19],"to":[20,28,93],"implement":[21],"vehicular":[23],"ad-hoc":[24],"(VANET).":[26],"Due":[27],"openness":[30],"and":[31,40,60,82,113,116,133,164],"particularity":[33],"vehicle":[36],"networking":[37],"environment,":[38],"security":[39,53,120,129,137],"efficiency":[41],"become":[43],"key":[45],"issues":[46],"in":[47,55],"VANET.":[48],"This":[49],"paper":[50],"analyzes":[51],"deficiencies":[54],"state-of-the-art":[57],"scheme":[58,66,104,126,157],"NECPPA":[59,153],"proposes":[61],"a":[62],"novel":[63],"V2I":[64],"based":[67],"on":[68,139],"certificateless":[70,98],"aggregate":[71],"signature.":[72],"Our":[73,102],"method":[75],"adopts":[76],"combination":[78],"RSU-based":[80],"authentication":[81,100],"inserting":[83],"TPD":[84],"into":[85],"RSU.":[86],"Also,":[87],"we":[88],"elliptic":[90],"curve":[91],"cryptography":[92],"construct":[94],"an":[95],"improved":[96],"secure":[97],"aggregation":[99],"scheme.":[101],"can":[105,134,158],"realize":[106],"function":[108],"conditional":[110],"privacy":[111],"protection":[112],"reduce":[114,160],"computing":[115],"costs.":[118],"Strict":[119],"analysis":[121,147],"proves":[122],"that":[123,149],"our":[124,155],"meets":[127],"requirements":[130],"VANETs":[132],"resist":[135],"common":[136],"attacks":[138],"Internet":[141],"Vehicles.":[143],"Besides,":[144],"experimental":[145],"performance":[146],"shows":[148],"compared":[150],"scheme,":[154],"greatly":[159],"computational":[162],"overhead":[163],"overhead.":[166]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
