{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:03:48Z","timestamp":1730322228179,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,25]]},"DOI":"10.1145\/3386164.3389107","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T01:30:15Z","timestamp":1591493415000},"page":"1-5","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust Mechanism Using Clustering Approach in Vehicular Network"],"prefix":"10.1145","author":[{"given":"Nourelimane","family":"Bousmaha","sequence":"first","affiliation":[{"name":"CY Cergy Paris University, ETIS Laboratory, Cergy, France"}]},{"given":"Mohamed","family":"Maachaoui","sequence":"additional","affiliation":[{"name":"CY Cergy Paris University, Quartz Laboratory, Cergy, France"}]},{"given":"Rachid","family":"Chelouah","sequence":"additional","affiliation":[{"name":"CY Cergy Paris University, ETIS Laboratory, Cergy, France"}]}],"member":"320","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"2278","article-title":"A comparative study of clustering protocols in VANET","volume":"6","author":"Malathi A.","year":"2017","unstructured":"A. Malathi , Dr. N. Sreenath , \" A comparative study of clustering protocols in VANET \", International Journal of Emerging Trends \\& Technology in Computer Science (IJETTCS)} , Vol 6 , no. 1 , pp. 2278 -- 6856 , 2017 A. Malathi, Dr. N. Sreenath, \"A comparative study of clustering protocols in VANET\", International Journal of Emerging Trends \\& Technology in Computer Science (IJETTCS)}, Vol 6, no.1, pp. 2278--6856, 2017","journal-title":"International Journal of Emerging Trends \\& Technology in Computer Science (IJETTCS)}"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.028"},{"key":"e_1_3_2_1_4_1","volume-title":"Second International Conference on Network Applications, Protocols and Services","author":"Samara Ghassan","year":"2010","unstructured":"Ghassan Samara , Wafaa A.H. Al-Salihy , R. Sures , \" Security Analysis of Vehicular Ad Hoc Networks (VANET)\". Second International Conference on Network Applications, Protocols and Services , 2010 . Ghassan Samara, Wafaa A.H. Al-Salihy, R. Sures, \"Security Analysis of Vehicular Ad Hoc Networks (VANET)\". Second International Conference on Network Applications, Protocols and Services, 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"e_1_3_2_1_6_1","first-page":"535","article-title":"Clustering in Vehicular Ad Hoc Networks using Affinity Propagation","year":"2014","unstructured":"Hassanabadi, B., \" Clustering in Vehicular Ad Hoc Networks using Affinity Propagation .\" Ad Hoc Networks , pp. 535 -- 548 , 2014 . Hassanabadi, B., et al. \"Clustering in Vehicular Ad Hoc Networks using Affinity Propagation.\" Ad Hoc Networks, pp.535--548, 2014.","journal-title":"Ad Hoc Networks"},{"key":"e_1_3_2_1_7_1","first-page":"338","volume-title":"Fuzzy sets. Information and control","author":"Zadeh L. A.","year":"1965","unstructured":"L. A. Zadeh . Fuzzy sets. Information and control , vol. 8 ( 1965 ), pp. 338 -- 353 . L. A. Zadeh. Fuzzy sets. Information and control, vol. 8 (1965), pp. 338--353."},{"key":"e_1_3_2_1_8_1","first-page":"214","article-title":"Survey on VANET security challenges and possible cryptographic solutions","author":"NidhalMejri Jalel Mohamed","year":"2014","unstructured":"Mohamed NidhalMejri Jalel Ben-Othman, M. \" Survey on VANET security challenges and possible cryptographic solutions \" Vehicular Communications , pp. 214 -- 2096 , 2014 . Mohamed NidhalMejri Jalel Ben-Othman, M. \"Survey on VANET security challenges and possible cryptographic solutions\" Vehicular Communications, pp. 214--2096, 2014.","journal-title":"Vehicular Communications"},{"issue":"9","key":"e_1_3_2_1_9_1","first-page":"2079","article-title":"A Survey of VANET Technologies","volume":"5","author":"Anwer M. Shahid","year":"2014","unstructured":"M. Shahid Anwer , 2. C. G. \" A Survey of VANET Technologies \" Journal of Emerging Trends in Computing and Information Sciences , vol. 5 , no. 9 , pp. 2079 -- 8407 , 2014 . M. Shahid Anwer, 2. C. G. \"A Survey of VANET Technologies\" Journal of Emerging Trends in Computing and Information Sciences, vol. 5, no.9, pp. 2079--8407, 2014.","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.5.25"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2012.6395939"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0353-y"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"Vehicular Technology Conference IEEE","author":"Gazdar Tahani","year":"2011","unstructured":"Tahani Gazdar , Abderrahim Benslimane , and Abdelfettah Belghith , \" Secure Clustering Scheme Based Keys Management in VANETs\" , In Vehicular Technology Conference IEEE , pp. 1 -- 5 , 2011 . Tahani Gazdar, Abderrahim Benslimane, and Abdelfettah Belghith, \"Secure Clustering Scheme Based Keys Management in VANETs\", In Vehicular Technology Conference IEEE, pp.1--5, 2011."},{"key":"e_1_3_2_1_16_1","first-page":"1570","article-title":"Using trust model to ensure reliable data acquisition in VANETs","author":"Yao Xuanxia","year":"2016","unstructured":"Xuanxia Yao , Xinlei Zhang , Huansheng Ning , Pengjian Li , \" Using trust model to ensure reliable data acquisition in VANETs \", Ad Hoc Networks , pp. 1570 -- 8705 , 2016 . Xuanxia Yao, Xinlei Zhang, Huansheng Ning, Pengjian Li, \"Using trust model to ensure reliable data acquisition in VANETs\", Ad Hoc Networks, pp. 1570--8705, 2016.","journal-title":"Ad Hoc Networks"}],"event":{"name":"ISCSIC 2019: 2019 3rd International Symposium on Computer Science and Intelligent Control","acronym":"ISCSIC 2019","location":"Amsterdam Netherlands"},"container-title":["Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3386164.3389107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T23:35:24Z","timestamp":1673739324000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3386164.3389107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,25]]},"references-count":16,"alternative-id":["10.1145\/3386164.3389107","10.1145\/3386164"],"URL":"https:\/\/doi.org\/10.1145\/3386164.3389107","relation":{},"subject":[],"published":{"date-parts":[[2019,9,25]]},"assertion":[{"value":"2020-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}