{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:09:37Z","timestamp":1725080977258},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"European Union's Seventh Framework Programme through the PRESERVE project","award":["269994"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2014]]},"DOI":"10.1109\/comst.2014.2320091","type":"journal-article","created":{"date-parts":[[2014,4,24]],"date-time":"2014-04-24T18:03:14Z","timestamp":1398362594000},"page":"1909-1932","source":"Crossref","is-referenced-by-count":44,"title":["In-Network Aggregation for Vehicular <italic>Ad Hoc<\/italic> Networks"],"prefix":"10.1109","volume":"16","author":[{"given":"Stefan","family":"Dietzel","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Petit","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]},{"given":"Bjorn","family":"Scheuermann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"klir","year":"1995","journal-title":"Fuzzy Sets and Fuzzy Logic Theory and Applications"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.004"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2008.4660116"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33050-6_10"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287750"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2003.1208829"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1016-0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25734-6_125"},{"key":"ref35","author":"mackay","year":"2003","journal-title":"Information Theory Inference and Learning Algorithms"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031525"},{"key":"ref28","year":"1994"},{"key":"ref27","first-page":"1","article-title":"A comparative study of data dissemination models for VANETs","author":"nadeem","year":"0","journal-title":"Proc 3rd Annu Int Conf Mobile Ubiquitous Syst"},{"key":"ref29","year":"1998"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2004.1263039"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614352"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2004.1391464"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2008.4660113"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2008.ECP.59"},{"key":"ref26","first-page":"1","article-title":"Light-weight laser-aided position verification for cascade","author":"ibrahim","year":"0","journal-title":"Proc Int Conf WAVE"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410061"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2010.5698256"},{"key":"ref59","author":"waggener","year":"1995","journal-title":"Pulse Code Modulation Techniques With Applications in Communications and Data Recording"},{"key":"ref58","author":"salomon","year":"2007","journal-title":"Data Compression The Complete Reference"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.22.6.652"},{"key":"ref55","doi-asserted-by":"crossref","author":"zadeh","year":"1996","journal-title":"Fuzzy Sets Fuzzy Logic and Fuzzy Systems","DOI":"10.1142\/2895"},{"key":"ref54","first-page":"1","article-title":"Providing over-the-horizon awareness to driver support systems","author":"van eenennaam","year":"0","journal-title":"Proc 4th IEEE Workshop V2VCOM"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2004.842407"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069721"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5395780"},{"key":"ref4","year":"2010","journal-title":"DSRC Implementation Guide A Guide to Users of SAE J2735 Message Sets Over DSRC"},{"key":"ref3","year":"2013"},{"key":"ref6","year":"2011"},{"key":"ref5","year":"2007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741885"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1641804.1641824"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689254"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2006.289012"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"ref45","year":"2013"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"ref47","first-page":"251","article-title":"The Sybil attack","author":"douceur","year":"0","journal-title":"Proc 1st IPTPS"},{"key":"ref42","first-page":"91","article-title":"Privacy implications of in-network aggregation mechanisms for VANETs (invited paper)","author":"dietzel","year":"0","journal-title":"Proc 8th Int Conf WONS"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.135"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2033079"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737622"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161076"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368893"},{"key":"ref76","first-page":"1","article-title":"Strategies for context-adaptive message dissemination in vehicular ad hoc networks","author":"eichler","year":"0","journal-title":"Proc 3rd Annu Int Conf Mobile Ubiquitous Syst Netw Services"},{"key":"ref77","first-page":"468","article-title":"VANETs-based real-time traffic data dissemination","author":"chen","year":"0","journal-title":"Proc IEEE Int Conf WCNIS"},{"key":"ref74","first-page":"4","article-title":"Opportunistic resource exchange in inter-vehicle ad-hoc networks","author":"xu","year":"0","journal-title":"In Mobile Data Management"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2010.51"},{"key":"ref78","author":"vahdat","year":"2000","journal-title":"Epidemic routing for partially-connected ad hoc networks"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2009.5208063"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2010.5548073"},{"key":"ref62","year":"2012","journal-title":"ZIP File Format Specification"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161077"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659158"},{"key":"ref64","article-title":"Differential quantization of communication signals","author":"cutler","year":"1952"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5493652"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1974.223784"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.12.008"},{"key":"ref2","year":"2013"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2351476.2351488"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470661314"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5458375"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.comcom.2013.09.005","article-title":"Learning automata-based opportunistic data aggregation and forwarding scheme for alert generation in vehicular ad hoc networks","volume":"39","author":"kumar","year":"2013","journal-title":"Comput Commun"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462147"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.358967"},{"key":"ref91","first-page":"1","article-title":"CARAVAN: Providing location privacy for VANET","author":"sampigethaya","year":"0","journal-title":"Proc 3rd ESCAR Conf"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2236117"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287879"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.06.002"},{"key":"ref96","year":"2010","journal-title":"Intelligent Transport Systems (ITS) Vehicular Communications Basic Set of Applications"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2267210"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409955"},{"key":"ref11","first-page":"44","article-title":"Performance study on the effects of cell-breathing in WCDMA","author":"thng","year":"0","journal-title":"Proc 2nd Int Symp Wireless Commun Syst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"ref13","doi-asserted-by":"crossref","author":"hartenstein","year":"2010","journal-title":"VANET Vehicular Applications and Inter-Networking Technologies","DOI":"10.1002\/9780470740637"},{"key":"ref14","year":"2010"},{"key":"ref15","first-page":"61","article-title":"A structure-free aggregation framework for vehicular ad hoc networks","author":"dietzel","year":"0","journal-title":"Proc 6th Int WIT"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1614269.1614283"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.10.112"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161070"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410054"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.368958"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1031483.1031487"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604185"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410053"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2010.515905"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998440"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502132"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462119"},{"key":"ref88","first-page":"31","article-title":"Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme","volume":"2567","author":"boldyreva","year":"0","journal-title":"Proc Public Key Cryptography"}],"container-title":["IEEE Communications Surveys & Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/6963743\/06805128.pdf?arnumber=6805128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T11:13:56Z","timestamp":1689160436000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6805128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":99,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2014.2320091","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}