{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:13:50Z","timestamp":1725621230369},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/ivs.2014.6856548","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T16:27:44Z","timestamp":1406651264000},"page":"1043-1048","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Cooperative ITS Vehicle Application Oriented Security Framework"],"prefix":"10.1109","author":[{"given":"R.","family":"Moalla","sequence":"first","affiliation":[]},{"given":"B.","family":"Lonc","sequence":"additional","affiliation":[]},{"given":"H.","family":"Labiod","sequence":"additional","affiliation":[]},{"given":"N.","family":"Simoni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Score F Project Homepage","year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940525"},{"key":"18","article-title":"Central misbehavior evaluation for vanets based on mobility data plausibility","author":"bissmeyer","year":"2012","journal-title":"ACM International Workshop on Vehicular Internetworking Systems and Applications"},{"journal-title":"Intelligent Transport Systems - Communications Access for Land Mobiles (CALM) - IPv6 Networking Security","year":"2012","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2013.6615528"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.4.7.552-564"},{"key":"14","article-title":"Creating a secure infrastructure for wireless diagnostics and software updates in vehicles","author":"nilsson","year":"2008","journal-title":"Chalmers University of Technology Tech Rep"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2012.6463997"},{"journal-title":"Defense in Depth A Practical Strategy for Achieving Information Assurance in Todays Highly Networked Environments","year":"0","key":"12"},{"journal-title":"PRESERVE Project Homepage","year":"0","key":"3"},{"journal-title":"SEVECOM Project Homepage","year":"0","key":"2"},{"journal-title":"Intelligent Transport Systems (ITS) Communication Architecture","year":"2010","key":"1"},{"journal-title":"SEIS Project Homepage","year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"6","article-title":"On providing security for an open telematics platform","author":"eichler","year":"2005","journal-title":"Proc 6th Int Conf ITS Telecommun"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"key":"4","article-title":"Security architecture for vehicular communication","author":"gerlach","year":"2007","journal-title":"5th International Workshop on Intelligent Transportation (WIT)"},{"journal-title":"EVITA Project Homepage","year":"0","key":"9"},{"journal-title":"The Technical Writers Handbook","year":"1989","author":"young","key":"8"}],"event":{"name":"2014 IEEE Intelligent Vehicles Symposium (IV)","start":{"date-parts":[[2014,6,8]]},"location":"MI, USA","end":{"date-parts":[[2014,6,11]]}},"container-title":["2014 IEEE Intelligent Vehicles Symposium Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6848889\/6856370\/06856548.pdf?arnumber=6856548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:16:07Z","timestamp":1490285767000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6856548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ivs.2014.6856548","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}