{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:01:36Z","timestamp":1729659696443,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/iscit.2017.8261227","type":"proceedings-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T22:59:22Z","timestamp":1516316362000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Analytic model on data security in VANETs"],"prefix":"10.1109","author":[{"given":"Xuan","family":"Zha","sequence":"first","affiliation":[]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Y. Jay","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xinxin","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Kangfeng","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503239"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.09.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2187319"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.061010.091803"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3821","DOI":"10.1109\/TIT.2012.2189353","article-title":"Performance of the Eschenauer-Gligor key distribution scheme under an ON\/OFF channel","volume":"58","author":"yagan","year":"2012","journal-title":"IEEE Trans Information Theory"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2388575"},{"journal-title":"VANET Vehicular Applications and Inter-Networking Technologies","year":"2010","author":"mittag","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15103"},{"journal-title":"IEEE","article-title":"IEEE standard for wireless access in vehicular environments security services for applications and management messages","year":"2013","key":"ref1"}],"event":{"name":"2017 17th International Symposium on Communications and Information Technologies (ISCIT)","start":{"date-parts":[[2017,9,25]]},"location":"Cairns, Australia","end":{"date-parts":[[2017,9,27]]}},"container-title":["2017 17th International Symposium on Communications and Information Technologies (ISCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8254262\/8261157\/08261227.pdf?arnumber=8261227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T14:42:16Z","timestamp":1570632136000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8261227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iscit.2017.8261227","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}