{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:22:31Z","timestamp":1761402151927,"version":"build-2065373602"},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1016\/j.comnet.2021.107872","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T11:37:31Z","timestamp":1611833851000},"page":"107872","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Dynamic fine-grained access control scheme for vehicular ad hoc networks"],"prefix":"10.1016","volume":"188","author":[{"given":"Tao","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6178-8549","authenticated-orcid":false,"given":"Li","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Jiang","family":"Duan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2021.107872_b1","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1109\/TITS.2015.2439292","article-title":"A security and privacy review of VANETs","volume":"16","author":"Qu","year":"2015","journal-title":"IEEE Trans. Intell. Transp.\u00a0Syst."},{"key":"10.1016\/j.comnet.2021.107872_b2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3745\/JIPS.2014.10.1.103","article-title":"Cooperation-aware VANET clouds: Providing secure cloud services to vehicular ad hoc networks","volume":"10","author":"Hussain","year":"2014","journal-title":"J. Inf. Process. Syst."},{"key":"10.1016\/j.comnet.2021.107872_b3","series-title":"Proceedings of the 2014 11th Annual High Capacity Optical Networks and Emerging\/Enabling Technologies(Photonics for Energy)","first-page":"94","article-title":"On the impact of quality of experience (QoE) in a vehicular cloud with various providers","author":"Aloqaily","year":"2014"},{"key":"10.1016\/j.comnet.2021.107872_b4","doi-asserted-by":"crossref","first-page":"3442","DOI":"10.1109\/TVT.2007.906878","article-title":"GSIS: A secure and privacy-preserving protocol for vehicular communications","volume":"56","author":"Lin","year":"2007","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2021.107872_b5","series-title":"Proceedings of the 27th Conference on Computer Communications, Vols. 13\u201318","first-page":"1229","article-title":"ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications","author":"Lu","year":"2008"},{"key":"10.1016\/j.comnet.2021.107872_b6","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","article-title":"A secure authentication scheme for VANETs with batch verification","volume":"21","author":"Bayat","year":"2015","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.comnet.2021.107872_b7","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/JSAC.2011.110312","article-title":"ABACS: An attribute-based access control system for emergency services over vehicular ad hoc networks","volume":"29","author":"Yeh","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2021.107872_b8","doi-asserted-by":"crossref","first-page":"66832","DOI":"10.1109\/ACCESS.2019.2918434","article-title":"Updatable ciphertext-policy attribute-based encryption scheme with traceability and revocability","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2021.107872_b9","first-page":"32096","article-title":"Traceable-then-revocable ciphertext-policy attribute-based encryption scheme","volume":"17","author":"Liu","year":"2017","journal-title":"Future Gen. Comput. Syst."},{"key":"10.1016\/j.comnet.2021.107872_b10","first-page":"1","article-title":"Cryptcloud+: secure and expressive data access control for cloud storage","volume":"99","author":"Ning","year":"2018","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.comnet.2021.107872_b11","series-title":"Proceedings of the 2008 IEEE International Conference on Communications, Vol. 19\u201323","first-page":"436","article-title":"AEMA: An aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks","author":"Zhu","year":"2008"},{"key":"10.1016\/j.comnet.2021.107872_b12","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"Raya","year":"2007","journal-title":"J. Comput. Secur."},{"key":"10.1016\/j.comnet.2021.107872_b13","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.future.2016.04.024","article-title":"On-siteDriverID: A secure authentication scheme based on Spanish eID cards for vehicular ad hoc networks","volume":"64","author":"S\u00e1nchez-Garc\u00eda","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2021.107872_b14","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.future.2015.09.028","article-title":"Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing","volume":"62","author":"Yang","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2021.107872_b15","doi-asserted-by":"crossref","first-page":"1573","DOI":"10.3390\/s18051573","article-title":"PCPA: A practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks","volume":"18","author":"Ming","year":"2018","journal-title":"Sensors"},{"key":"10.1016\/j.comnet.2021.107872_b16","first-page":"98","article-title":"A fine-grained privacy preserving protocol over attribute based access control for VANETs","volume":"6","author":"Nkenyereye","year":"2015","journal-title":"J. Wirel. Mobile Netw. Ubiquitous Comput."},{"key":"10.1016\/j.comnet.2021.107872_b17","series-title":"Advances in Cryptology\u2014Eurocrypt, Vol. 3494","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"Sahai","year":"2005"},{"key":"10.1016\/j.comnet.2021.107872_b18","series-title":"ACM conference on Computer and Communications Security","first-page":"89","article-title":"Attribute based encryption for fine-grained access conrol of encrypted data","author":"Goyal","year":"2006"},{"key":"10.1016\/j.comnet.2021.107872_b19","series-title":"Proceedings of the IEEE Symposium on Security and Privacy, Vol. 3494","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"Bethencourt","year":"2007"},{"key":"10.1016\/j.comnet.2021.107872_b20","series-title":"Proceedings of ASIACCS","first-page":"261","article-title":"Attribute based data sharing with attribute revocation","author":"Yu","year":"2010"},{"key":"10.1016\/j.comnet.2021.107872_b21","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","article-title":"HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing","volume":"7","author":"Wan","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2021.107872_b22","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10623-016-0287-3","article-title":"Effcient revocable identity-based encryption via subset diference methods","volume":"85","author":"Lee","year":"2017","journal-title":"Des. Codes Cryptogr."},{"key":"10.1016\/j.comnet.2021.107872_b23","doi-asserted-by":"crossref","first-page":"4477","DOI":"10.1007\/s11042-017-4804-9","article-title":"Achieving secure data access control and efficient key updating in mobile multimedia sensor networks","volume":"77","author":"Hong","year":"2018","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.comnet.2021.107872_b24","series-title":"2018 IEEE 3rd International Conference on Big Data Analysis","first-page":"312","article-title":"Attribute-based proxy reencryption method for revocation in cloud storage: Reduction of communication cost at re-encryption","author":"Yasumura","year":"2018"},{"key":"10.1016\/j.comnet.2021.107872_b25","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/TIFS.2017.2746000","article-title":"Fine-grained twofactor protection mechanism for data sharing in cloud storage","volume":"13","author":"Zuo","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2021.107872_b26","series-title":"proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"Boneh","year":"2001"},{"key":"10.1016\/j.comnet.2021.107872_b27","series-title":"Secure Schemes for Secret Sharing and Key Distribution","first-page":"1","author":"Beimel","year":"1996"},{"key":"10.1016\/j.comnet.2021.107872_b28","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","volume":"3494","author":"Boneh","year":"2005","journal-title":"In Advances in cryptology-Eurocrypt 2005"},{"key":"10.1016\/j.comnet.2021.107872_b29","series-title":"Advances in Cryptology-EUROCRYPT 2003, Vol. 2656","article-title":"A forward-secure public-key encryption scheme","author":"Canetti","year":"2003"},{"key":"10.1016\/j.comnet.2021.107872_b30","series-title":"Advances in Cryptology-EUROCRYPT 2004, vol. 3027","first-page":"207","article-title":"Chosen-ciphertext security from identity-based encryption","author":"Canetti","year":"2004"},{"journal-title":"IEEE Std","article-title":"IEEE trial-use standard for wireless access in vehicular environmentsecurity services for applications and management messges","year":"2006","key":"10.1016\/j.comnet.2021.107872_b31"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128621000402?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128621000402?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:11:33Z","timestamp":1761397893000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128621000402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":31,"alternative-id":["S1389128621000402"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2021.107872","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Dynamic fine-grained access control scheme for vehicular ad hoc networks","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2021.107872","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"107872"}}