{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:09:57Z","timestamp":1761401397839,"version":"3.34.0"},"reference-count":26,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[2008,6,1]],"date-time":"2008-06-01T00:00:00Z","timestamp":1212278400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1016\/j.comcom.2008.03.012","type":"journal-article","created":{"date-parts":[[2008,3,27]],"date-time":"2008-03-27T20:22:15Z","timestamp":1206649335000},"page":"2478-2484","source":"Crossref","is-referenced-by-count":46,"title":["A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks"],"prefix":"10.1016","volume":"31","author":[{"given":"Jesus Tellez","family":"Isaac","sequence":"first","affiliation":[]},{"given":"Jose Sierra","family":"Camara","sequence":"additional","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"given":"Joaquin Torres","family":"Marquez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.comcom.2008.03.012_bib1","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1147\/sj.371.0072","article-title":"Designing a generic payment service","volume":"37","author":"Abad-Peiro","year":"1998","journal-title":"IBM Systems Journal"},{"key":"10.1016\/j.comcom.2008.03.012_bib2","doi-asserted-by":"crossref","unstructured":"N. Asokan, Anonymity in a mobile computing environment, in: Proceedings of the Workshop on Mobile Computing Systems and Applications, 1994, pp. 200\u2013204.","DOI":"10.1109\/WMCSA.1994.9"},{"key":"10.1016\/j.comcom.2008.03.012_bib3","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/2.612244","article-title":"The state of the art in electronic payment systems","volume":"30","author":"Asokan","year":"1997","journal-title":"Computer"},{"issue":"4","key":"10.1016\/j.comcom.2008.03.012_bib4","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.cose.2004.10.004","article-title":"Information assurance for security protocols","volume":"24","author":"Bella","year":"2005","journal-title":"Computers and Security"},{"key":"10.1016\/j.comcom.2008.03.012_bib5","unstructured":"Car2Car Communication Consortium. Overview of the C2C\u2013CC System. Technical Report version 1.0, Car2Car Communication Consortium, 2007."},{"issue":"1","key":"10.1016\/j.comcom.2008.03.012_bib6","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.amc.2003.12.020","article-title":"Digital signature with message recovery using self-certified public keys without trustworthy system authority","volume":"161","author":"Chang","year":"2005","journal-title":"Applied Mathematics and Computation"},{"key":"10.1016\/j.comcom.2008.03.012_bib7","doi-asserted-by":"crossref","unstructured":"D. Cottingham, I. Wassell, R. Harle, Performance of IEEE 802.11a in vehicular contexts, in: Vehicular Technology Conference, 2007, pp. 854\u2013858.","DOI":"10.1109\/VETECS.2007.185"},{"key":"10.1016\/j.comcom.2008.03.012_bib8","doi-asserted-by":"crossref","unstructured":"F. D\u00f6tzer, Privacy issues in vehicular ad hoc networks, in: 5th International Workshop on Privacy Enhancing Technologies, 2005, pp. 197\u2013209.","DOI":"10.1007\/11767831_13"},{"key":"10.1016\/j.comcom.2008.03.012_bib9","unstructured":"M. Girault, Self-certified public keys, in: Proceedings of EUROCRYPT\u201991, 1991, pp. 491\u2013497."},{"key":"10.1016\/j.comcom.2008.03.012_bib10","unstructured":"L. Gollan, C. Meinel, Digital signatures for automobiles? in: Wireless and Optical Communications (WOC 2002), 2002."},{"issue":"2","key":"10.1016\/j.comcom.2008.03.012_bib11","first-page":"185","article-title":"A weakness in authenticated encryption schemes based on Tseng et al.\u2019s schemes","volume":"7","author":"Hern\u00e1ndez Encinas","year":"2008","journal-title":"International Journal of Network Security"},{"key":"10.1016\/j.comcom.2008.03.012_bib12","unstructured":"Z. Hu, Y. Liu, X. Hu, J. Li, Anonymous micropayments authentication (AMA) in mobile data network, in: 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM), 2004, pp. 46\u201353."},{"issue":"1","key":"10.1016\/j.comcom.2008.03.012_bib13","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.amc.2003.07.004","article-title":"Repairing ElGamal-like multi-signature schemes using self-certified public keys","volume":"156","author":"Hwang","year":"2004","journal-title":"Applied Mathematics and Computation"},{"issue":"2","key":"10.1016\/j.comcom.2008.03.012_bib14","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.csi.2005.01.001","article-title":"A new efficient authentication protocol for mobile networks","volume":"28","author":"Hwang","year":"2005","journal-title":"Computer Standard and Interfaces"},{"key":"10.1016\/j.comcom.2008.03.012_bib15","unstructured":"IEEE Computer Society LAN MAN Standards Committee, wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Std 802.11-1999. The Institute of Electrical and Electronics Engineers, 1999."},{"key":"10.1016\/j.comcom.2008.03.012_bib16","doi-asserted-by":"crossref","unstructured":"S. Kungpisdan, A secure account-based mobile payment system protocol, in: International Conference on Information Technology: Coding and Computing (ITCC), 2004, pp. 35\u201339.","DOI":"10.1109\/ITCC.2004.1286422"},{"key":"10.1016\/j.comcom.2008.03.012_bib17","unstructured":"Y. Lei, D. Chen, Z. Jiang, Generating digital signatures on mobile devices, in: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004, pp. 532\u2013535."},{"year":"1997","series-title":"Handbook of Applied Cryptography","author":"Menezes","key":"10.1016\/j.comcom.2008.03.012_bib18"},{"key":"10.1016\/j.comcom.2008.03.012_bib19","unstructured":"P. Papadimitratos, A. Kung, J.-P. Hubaux, F. Kargl, Privacy and identity management for vehicular communication systems: a position paper, in: Workshop on Standards for Privacy in User-centric Identity Management, 2006."},{"key":"10.1016\/j.comcom.2008.03.012_bib20","doi-asserted-by":"crossref","unstructured":"M. Raya, J.-P. Hubaux, The security of vehicular ad hoc networks, in: 3rd ACM Workshop on Security of ad hoc and Sensor Networks (SASN\u201905), 2005, pp. 11\u201321.","DOI":"10.1145\/1102219.1102223"},{"key":"10.1016\/j.comcom.2008.03.012_bib21","doi-asserted-by":"crossref","unstructured":"A. Saha, D. Johnson, Modeling mobility for vehicular ad-hoc networks, in: 1st ACM International Workshop on Vehicular ad hoc Networks, 2004, pp. 91\u201392.","DOI":"10.1145\/1023875.1023892"},{"year":"1999","series-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings","key":"10.1016\/j.comcom.2008.03.012_bib22"},{"issue":"2\u20133","key":"10.1016\/j.comcom.2008.03.012_bib23","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/S0096-3003(02)00010-3","article-title":"Digital signature with message recovery using self-certified public keys and its variants","volume":"136","author":"Tseng","year":"2003","journal-title":"Applied Mathematics and Computation"},{"key":"10.1016\/j.comcom.2008.03.012_bib24","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/MC.2002.1106185","article-title":"Mobile payments","volume":"35","author":"Varshney","year":"2002","journal-title":"Computer"},{"key":"10.1016\/j.comcom.2008.03.012_bib25","doi-asserted-by":"crossref","unstructured":"S. Yousefi, M. Mousavi, M. Fathy, Vehicular ad hoc networks (VANETs): challenges and perspectives, in: 6th International Conference on ITS Telecommunications, 2006, pp. 761\u2013766.","DOI":"10.1109\/ITST.2006.289012"},{"issue":"3","key":"10.1016\/j.comcom.2008.03.012_bib26","first-page":"343","article-title":"On the security of a digital signature with message recovery using self-certified public key","volume":"29","author":"Zhang","year":"2005","journal-title":"Informatica (Slovenia)"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366408001680?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366408001680?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T16:17:20Z","timestamp":1557418640000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366408001680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":26,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["S0140366408001680"],"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2008.03.012","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2008,6]]}}}