{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:29:53Z","timestamp":1730316593111,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517968.2517972","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"9-18","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Efficient and secure storage of private keys for pseudonymous vehicular communication"],"prefix":"10.1145","author":[{"given":"Michael","family":"Feiri","sequence":"first","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]},{"given":"Jonathan","family":"Petit","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[{"name":"University of Ulm, Ulm, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"World Automotive Congress (FISITA '10)","author":"Apvrille L.","year":"2010","unstructured":"L. Apvrille , R. El Khayari , O. Henniger , Y. Roudier , H. Schweppe , H. Seudi\u00e9 , B. Weyl , and M. Wolf . Secure automotive on-board electronics network architecture . World Automotive Congress (FISITA '10) , May 2010 . L. Apvrille, R. El Khayari, O. Henniger, Y. Roudier, H. Schweppe, H. Seudi\u00e9, B. Weyl, and M. Wolf. Secure automotive on-board electronics network architecture. World Automotive Congress (FISITA '10), May 2010."},{"key":"e_1_3_2_1_2_1","volume-title":"Technology Administration","author":"Barker E. B.","year":"2007","unstructured":"E. B. Barker and J. M. Kelsey . Recommendation for random number generation using deterministic random bit generators (revised). US Department of Commerce , Technology Administration , National Institute of Standards and Technology , Computer Security Division, Information Technology Laboratory, 2007 . E. B. Barker and J. M. Kelsey. Recommendation for random number generation using deterministic random bit generators (revised). US Department of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory, 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287748.1287752"},{"key":"e_1_3_2_1_4_1","volume-title":"MD","author":"Chen L.","year":"2011","unstructured":"L. Chen . SP 800--56C. recommendation for key derivation through extraction-then-expansion. Technical report, Gaithersburg , MD , United States , 2011 . L. Chen. SP 800--56C. recommendation for key derivation through extraction-then-expansion. Technical report, Gaithersburg, MD, United States, 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MEDHOCNET.2010.5546877"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955011"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1373290.1373302"},{"key":"e_1_3_2_1_8_1","series-title":"LNCS","first-page":"523","volume-title":"Advances in Cryptology -- EUROCRYPT","author":"Dodis Y.","year":"2004","unstructured":"Y. Dodis , M. Reyzin , and A. Smith . Fuzzy extractors: How to generate strong keys from biometrics and other noisy data . In Advances in Cryptology -- EUROCRYPT 2004 , volume 3027 of LNCS , pages 523 -- 540 , 2004. Y. Dodis, M. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology -- EUROCRYPT 2004, volume 3027 of LNCS, pages 523--540, 2004."},{"key":"e_1_3_2_1_9_1","volume-title":"MD","author":"Elaine B.","year":"2007","unstructured":"B. Elaine , J. Don , and S. Miles . SP 800--56A. recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. Technical report, Gaithersburg , MD , United States , 2007 . B. Elaine, J. Don, and S. Miles. SP 800--56A. recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. Technical report, Gaithersburg, MD, United States, 2007."},{"key":"e_1_3_2_1_10_1","volume-title":"ETSI TS 102 731 v1.1.1 - intelligent transport systems (ITS)","author":"ETSI TC","year":"2010","unstructured":"ETSI TC ITS. ETSI TS 102 731 v1.1.1 - intelligent transport systems (ITS) ; security; security services and architecture. Standard , 2010 . ETSI TC ITS. ETSI TS 102 731 v1.1.1 - intelligent transport systems (ITS); security; security services and architecture. Standard, 2010."},{"key":"e_1_3_2_1_11_1","volume-title":"ETSI TS 102 941 v1.1.1 - intelligent transport systems (ITS)","author":"ETSI TC","year":"2012","unstructured":"ETSI TC ITS. ETSI TS 102 941 v1.1.1 - intelligent transport systems (ITS) ; security; trust and privacy management. Standard , 2012 . ETSI TC ITS. ETSI TS 102 941 v1.1.1 - intelligent transport systems (ITS); security; trust and privacy management. Standard, 2012."},{"key":"e_1_3_2_1_12_1","volume-title":"ETSI TS 103 097 v1.1.1 - intelligent transport systems (ITS)","author":"ETSI TC","year":"2013","unstructured":"ETSI TC ITS. ETSI TS 103 097 v1.1.1 - intelligent transport systems (ITS) ; security; security header and certificate formats. Standard , 2013 . ETSI TC ITS. ETSI TS 103 097 v1.1.1 - intelligent transport systems (ITS); security; security header and certificate formats. Standard, 2013."},{"key":"e_1_3_2_1_13_1","volume-title":"June","author":"Processing Standards Federal Information","year":"2009","unstructured":"Federal Information Processing Standards . Digital Signature Standard (DSS) - FIPS 186--3 , June 2009 . Federal Information Processing Standards. Digital Signature Standard (DSS) - FIPS 186--3, June 2009."},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"Foundation T.","year":"2013","unstructured":"T. Foundation . Truecrypt - free open-source on-the-fly encryption, 2013 . Retrieved July 10, 2013 from http:\/\/www.truecrypt.org\/. T. Foundation. Truecrypt - free open-source on-the-fly encryption, 2013. Retrieved July 10, 2013 from http:\/\/www.truecrypt.org\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Research and Innovative Technology Administration","author":"Garcia D.","year":"2012","unstructured":"D. Garcia , A. Waite , R. Walsh , B. Sheppard , L. Frank , and D. Jeffers . Certificate management entities for connected vehicle environment. public workshop read-ahead document. Technical report FHWA-JPO-12-038 , Research and Innovative Technology Administration , May 2012 . D. Garcia, A. Waite, R. Walsh, B. Sheppard, L. Frank, and D. Jeffers. Certificate management entities for connected vehicle environment. public workshop read-ahead document. Technical report FHWA-JPO-12-038, Research and Innovative Technology Administration, May 2012."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"IEEE standard specifications for public-key cryptography- amendment 1: Additional techniques","author":"IEEE.","year":"2004","unstructured":"IEEE. IEEE standard specifications for public-key cryptography- amendment 1: Additional techniques . IEEE Std 1363a- 2004 (Amendment to IEEE Std 1363--2000), pages 1 -- 159 , 2004. IEEE. IEEE standard specifications for public-key cryptography- amendment 1: Additional techniques. IEEE Std 1363a-2004 (Amendment to IEEE Std 1363--2000), pages 1--159, 2004."},{"key":"e_1_3_2_1_17_1","volume-title":"Information technology - security techniques - encryption algorithms - part 2: Asymmetric ciphers. ISO\/IEC 18033--2","author":"IEC.","year":"2006","unstructured":"ISO\/ IEC. Information technology - security techniques - encryption algorithms - part 2: Asymmetric ciphers. ISO\/IEC 18033--2 , 2006 . ISO\/IEC. Information technology - security techniques - encryption algorithms - part 2: Asymmetric ciphers. ISO\/IEC 18033--2, 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2898"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689253"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0016-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/648022.757285"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.116"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Koch W.","year":"2013","unstructured":"W. Koch . Gnupg - the gnu privacy guard, 2013 . Retrieved July 10, 2013 from http:\/\/gnupg.org\/. W. Koch. Gnupg - the gnu privacy guard, 2013. Retrieved July 10, 2013 from http:\/\/gnupg.org\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881456"},{"key":"e_1_3_2_1_25_1","volume-title":"HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC","author":"Krawczyk H.","year":"2010","unstructured":"H. Krawczyk and P. Eronen . HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869, May 2010 . H. Krawczyk and P. Eronen. HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869, May 2010."},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","author":"Lange T.","year":"2013","unstructured":"T. Lange . PUFFIN - the physically unclonable functions found in standard pc components project, 2013 . Retrieved July 10, 2013 from http:\/\/puffin.eu.org\/. T. Lange. PUFFIN - the physically unclonable functions found in standard pc components project, 2013. Retrieved July 10, 2013 from http:\/\/puffin.eu.org\/."},{"key":"e_1_3_2_1_27_1","first-page":"1","volume-title":"IST Mobile and Wireless Communication Summit","author":"Leinm\u00fcller T.","year":"2006","unstructured":"T. Leinm\u00fcller , L. Buttyan , J.-P. Hubaux , F. Kargl , R. Kroh , P. Papadimitratos , M. Raya , and E. Schoch . Sevecom - secure vehicle communication . IST Mobile and Wireless Communication Summit , pages 1 -- 5 , 2006 . T. Leinm\u00fcller, L. Buttyan, J.-P. Hubaux, F. Kargl, R. Kroh, P. Papadimitratos, M. Raya, and E. Schoch. Sevecom - secure vehicle communication. IST Mobile and Wireless Communication Summit, pages 1--5, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762222.1762276"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/646555.694598"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_18"},{"key":"e_1_3_2_1_31_1","volume-title":"19th ITS World Congress","author":"Moerman K.","year":"2012","unstructured":"K. Moerman , T. van Roermund , and M. Knezevic . A realistic approach to message verification in car-to-car communication . 19th ITS World Congress , 2012 . K. Moerman, T. van Roermund, and M. Knezevic. A realistic approach to message verification in car-to-car communication. 19th ITS World Congress, 2012."},{"key":"e_1_3_2_1_33_1","first-page":"2026","volume":"297","author":"Pappu R.","year":"2002","unstructured":"R. Pappu , B. Recht , J. Taylor , and N. Gershenfeld . Physical One-Way Functions. Science , 297 : 2026 -- 2030 , 2002 . R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld. Physical One-Way Functions. Science, 297:2026--2030, 2002.","journal-title":"Physical One-Way Functions. Science"},{"key":"e_1_3_2_1_34_1","volume-title":"The Technical BSD Conference (BSDCan '09)","author":"Percival C.","year":"2009","unstructured":"C. Percival . Stronger key derivation via sequential memory-hard functions . The Technical BSD Conference (BSDCan '09) , May 2009 . C. Percival. Stronger key derivation via sequential memory-hard functions. The Technical BSD Conference (BSDCan '09), May 2009."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2012.6407450"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28540-0_24"},{"key":"e_1_3_2_1_37_1","first-page":"81","volume-title":"USENIX Annual Technical Conference, FREENIX Track","author":"Provos N.","year":"1999","unstructured":"N. Provos and D. Mazieres . A future-adaptable password scheme . USENIX Annual Technical Conference, FREENIX Track , pages 81 -- 91 , 1999 . N. Provos and D. Mazieres. A future-adaptable password scheme. USENIX Annual Technical Conference, FREENIX Track, pages 81--91, 1999."},{"key":"e_1_3_2_1_38_1","volume-title":"Retrieved","author":"Reichl D.","year":"2013","unstructured":"D. Reichl . Keepass password safe, 2013 . Retrieved July 10, 2013 from http:\/\/keepass.info. D. Reichl. Keepass password safe, 2013. Retrieved July 10, 2013 from http:\/\/keepass.info."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"e_1_3_2_1_40_1","volume-title":"Retrieved","author":"Schneier B.","year":"2013","unstructured":"B. Schneier . Password safe - the security of twofish in a password database, 2013 . Retrieved July 10, 2013 from http:\/\/www.schneier.com\/passsafe.html. B. Schneier. Password safe - the security of twofish in a password database, 2013. Retrieved July 10, 2013 from http:\/\/www.schneier.com\/passsafe.html."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1834182.1834216"},{"key":"e_1_3_2_1_42_1","first-page":"2007","article-title":"State of the art: Embedding security in vehicles","author":"Wolf M.","year":"2007","unstructured":"M. Wolf , A. Weimerskirch , and T. Wollinger . State of the art: Embedding security in vehicles . EURASIP Journal on Embedded Systems , 2007 , 2007 . M. Wolf, A. Weimerskirch, and T. Wollinger. State of the art: Embedding security in vehicles. EURASIP Journal on Embedded Systems, 2007, 2007.","journal-title":"EURASIP Journal on Embedded Systems"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110312"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.02.001"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517968.2517972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T14:42:35Z","timestamp":1673275355000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517968.2517972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":43,"alternative-id":["10.1145\/2517968.2517972","10.1145\/2517968"],"URL":"https:\/\/doi.org\/10.1145\/2517968.2517972","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}