{"id":"https:\/\/openalex.org\/W2288292407","doi":"https:\/\/doi.org\/10.1007\/s12083-016-0433-8","title":"Concurrently deniable ring authentication and its application to LBS in VANETs","display_name":"Concurrently deniable ring authentication and its application to LBS in VANETs","publication_year":2016,"publication_date":"2016-01-20","ids":{"openalex":"https:\/\/openalex.org\/W2288292407","doi":"https:\/\/doi.org\/10.1007\/s12083-016-0433-8","mag":"2288292407"},"language":"en","primary_location":{"id":"doi:10.1007\/s12083-016-0433-8","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1007\/s12083-016-0433-8","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https:\/\/openalex.org\/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5014482178","display_name":"Shengke Zeng","orcid":"https:\/\/orcid.org\/0000-0003-2004-9197"},"institutions":[{"id":"https:\/\/openalex.org\/I102345215","display_name":"Xihua University","ror":"https:\/\/ror.org\/04gwtvf26","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I102345215"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shengke Zeng","raw_affiliation_strings":["School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China","institution_ids":["https:\/\/openalex.org\/I102345215"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5100454388","display_name":"Yong Chen","orcid":"https:\/\/orcid.org\/0000-0002-1089-0110"},"institutions":[{"id":"https:\/\/openalex.org\/I102345215","display_name":"Xihua University","ror":"https:\/\/ror.org\/04gwtvf26","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I102345215"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Chen","raw_affiliation_strings":["School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China","institution_ids":["https:\/\/openalex.org\/I102345215"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5014331315","display_name":"Shuangquan Tan","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I102345215","display_name":"Xihua University","ror":"https:\/\/ror.org\/04gwtvf26","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I102345215"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuangquan Tan","raw_affiliation_strings":["School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China","institution_ids":["https:\/\/openalex.org\/I102345215"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5101992220","display_name":"Mingxing He","orcid":"https:\/\/orcid.org\/0000-0003-4170-2378"},"institutions":[{"id":"https:\/\/openalex.org\/I102345215","display_name":"Xihua University","ror":"https:\/\/ror.org\/04gwtvf26","country_code":"CN","type":"education","lineage":["https:\/\/openalex.org\/I102345215"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingxing He","raw_affiliation_strings":["School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software Engineering, Xihua University, Chengdu, 610039, China","institution_ids":["https:\/\/openalex.org\/I102345215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https:\/\/openalex.org\/A5014482178"],"corresponding_institution_ids":["https:\/\/openalex.org\/I102345215"],"apc_list":{"value":2790,"currency":"EUR","value_usd":3590},"apc_paid":null,"fwci":3.839,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93787321,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"10","issue":"4","first_page":"844","last_page":"856"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T11800","display_name":"User Authentication and Security Systems","score":0.9988999962806702,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.746519923210144},{"id":"https:\/\/openalex.org\/keywords\/authentication-protocol","display_name":"Authentication protocol","score":0.6142932176589966},{"id":"https:\/\/openalex.org\/keywords\/communication-source","display_name":"Communication source","score":0.5625402927398682},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.5579069256782532},{"id":"https:\/\/openalex.org\/keywords\/authentication","display_name":"Authentication (law)","score":0.551049530506134},{"id":"https:\/\/openalex.org\/keywords\/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.5171300768852234},{"id":"https:\/\/openalex.org\/keywords\/computer-network","display_name":"Computer network","score":0.5010833740234375},{"id":"https:\/\/openalex.org\/keywords\/ring-signature","display_name":"Ring signature","score":0.4914940595626831},{"id":"https:\/\/openalex.org\/keywords\/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.4309063255786896},{"id":"https:\/\/openalex.org\/keywords\/protocol","display_name":"Protocol (science)","score":0.4111120402812958},{"id":"https:\/\/openalex.org\/keywords\/encryption","display_name":"Encryption","score":0.3984706699848175},{"id":"https:\/\/openalex.org\/keywords\/public-key-cryptography","display_name":"Public-key cryptography","score":0.20749154686927795}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.746519923210144},{"id":"https:\/\/openalex.org\/C21564112","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6142932176589966},{"id":"https:\/\/openalex.org\/C198104137","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q974688","display_name":"Communication source","level":2,"score":0.5625402927398682},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.5579069256782532},{"id":"https:\/\/openalex.org\/C148417208","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4825882","display_name":"Authentication (law)","level":2,"score":0.551049530506134},{"id":"https:\/\/openalex.org\/C168970074","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.5171300768852234},{"id":"https:\/\/openalex.org\/C31258907","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1301371","display_name":"Computer network","level":1,"score":0.5010833740234375},{"id":"https:\/\/openalex.org\/C168941894","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3483645","display_name":"Ring signature","level":4,"score":0.4914940595626831},{"id":"https:\/\/openalex.org\/C167169670","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.4309063255786896},{"id":"https:\/\/openalex.org\/C2780385302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q367158","display_name":"Protocol (science)","level":3,"score":0.4111120402812958},{"id":"https:\/\/openalex.org\/C148730421","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q141090","display_name":"Encryption","level":2,"score":0.3984706699848175},{"id":"https:\/\/openalex.org\/C203062551","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20749154686927795},{"id":"https:\/\/openalex.org\/C142724271","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7208","display_name":"Pathology","level":1,"score":0},{"id":"https:\/\/openalex.org\/C204787440","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q188504","display_name":"Alternative medicine","level":2,"score":0},{"id":"https:\/\/openalex.org\/C71924100","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11190","display_name":"Medicine","level":0,"score":0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007\/s12083-016-0433-8","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1007\/s12083-016-0433-8","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https:\/\/openalex.org\/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https:\/\/openalex.org\/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https:\/\/openalex.org\/G3946662165","display_name":null,"funder_award_id":"61402376","funder_id":"https:\/\/openalex.org\/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https:\/\/openalex.org\/G401972981","display_name":null,"funder_award_id":"U1433130","funder_id":"https:\/\/openalex.org\/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https:\/\/openalex.org\/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https:\/\/ror.org\/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https:\/\/openalex.org\/W1482005385","https:\/\/openalex.org\/W1508362310","https:\/\/openalex.org\/W1508839005","https:\/\/openalex.org\/W1525737403","https:\/\/openalex.org\/W1543862047","https:\/\/openalex.org\/W1573231949","https:\/\/openalex.org\/W1585063482","https:\/\/openalex.org\/W1595974665","https:\/\/openalex.org\/W1901278359","https:\/\/openalex.org\/W1921661296","https:\/\/openalex.org\/W1983765476","https:\/\/openalex.org\/W2020071233","https:\/\/openalex.org\/W2036788199","https:\/\/openalex.org\/W2045474943","https:\/\/openalex.org\/W2061663892","https:\/\/openalex.org\/W2065722310","https:\/\/openalex.org\/W2068369660","https:\/\/openalex.org\/W2072669749","https:\/\/openalex.org\/W2087303942","https:\/\/openalex.org\/W2090168469","https:\/\/openalex.org\/W2090903439","https:\/\/openalex.org\/W2105844506","https:\/\/openalex.org\/W2108355001","https:\/\/openalex.org\/W2117852003","https:\/\/openalex.org\/W2139115648","https:\/\/openalex.org\/W2166706457","https:\/\/openalex.org\/W2397756951","https:\/\/openalex.org\/W2612974485","https:\/\/openalex.org\/W2911777915","https:\/\/openalex.org\/W4285719527"],"related_works":["https:\/\/openalex.org\/W2360010141","https:\/\/openalex.org\/W2134444393","https:\/\/openalex.org\/W2093798919","https:\/\/openalex.org\/W2107692711","https:\/\/openalex.org\/W2314541983","https:\/\/openalex.org\/W1949088485","https:\/\/openalex.org\/W2941888532","https:\/\/openalex.org\/W2374177735","https:\/\/openalex.org\/W2136908128","https:\/\/openalex.org\/W3096443715"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}