{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:45:15Z","timestamp":1740102315986,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","funder":[{"name":"Anonymization technology for AI-based analytics of mobility data (MOBILYTICS)","award":["MCIN\/AEI\/10.13039\/501100011033"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1145\/3616388.3617520","type":"proceedings-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T04:18:07Z","timestamp":1698293887000},"page":"165-173","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["SLOW-Based Pseudonym Changing Schemes for Location Privacy in Vehicular Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0317-9301","authenticated-orcid":false,"given":"Mateo Sebastian","family":"Lomas","sequence":"first","affiliation":[{"name":"Yachay Tech University, Urcuqu\u00ed, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3674-9385","authenticated-orcid":false,"given":"Robinson","family":"Paspuel","sequence":"additional","affiliation":[{"name":"Yachay Tech University, Urcuqu\u00ed, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4428-5418","authenticated-orcid":false,"given":"Cristhian","family":"Iza","sequence":"additional","affiliation":[{"name":"Yachay Tech University, Urcuqu\u00ed, Ecuador"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6518-888X","authenticated-orcid":false,"given":"M\u00f3nica","family":"Aguilar Igartua","sequence":"additional","affiliation":[{"name":"Universitat Polit\u00e8cnica de Catalunya, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2023,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/vnc.2009.5416380"},{"volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"Butty\u00e1n Levente","key":"e_1_3_2_1_2_1","unstructured":"Levente Butty\u00e1n, Tam\u00e1s Holczer, and Istv\u00e1n Vajda. 2007. On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In Security and Privacy in Ad-hoc and Sensor Networks. Springer Berlin Heidelberg, Berlin, Heidelberg, 129--141. isbn: 978--3--540--73275--4."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766500"},{"key":"e_1_3_2_1_4_1","unstructured":"K. Emara W. Woerndl and J. Schlichter. 2016. Context-based pseudonym changing scheme for vehicular adhoc networks (July 2016). arXiv: 1607.07656."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2016.7835979"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583473"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.15282\/mekatronika.v1i2.4991"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.519"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424677"},{"key":"e_1_3_2_1_10_1","volume-title":"ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS).","author":"Julien F","year":"2007","unstructured":"F Julien, M Raya, M Felegyhazi, and P Papadimitratos. 2007. Mixzones for location privacy in vehicular networks. In ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3043640"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/incos45849.2019.8951398"},{"volume-title":"The 21st IEEE International Conference on Intelligent Transportation Systems. IEEE. https:\/\/elib.dlr.de\/124092\/.","author":"Alvarez Pablo","key":"e_1_3_2_1_13_1","unstructured":"Pablo Alvarez Lopez et al. 2018. Microscopic traffic simulation using SUMO. In The 21st IEEE International Conference on Intelligent Transportation Systems. IEEE. https:\/\/elib.dlr.de\/124092\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3416011.3424757"},{"key":"e_1_3_2_1_15_1","unstructured":"OpenStreetMap contributors. 2017. https:\/\/www.openstreetmap.org. (2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2015.2439292"},{"key":"e_1_3_2_1_18_1","volume-title":"CARAVAN: Providing location privacy for VANET. Tech. rep. Washington Univ Seattle Dept of Electrical Engineering.","author":"Sampigethaya Krishna","year":"2005","unstructured":"Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, and Kaoru Sezaki. 2005. CARAVAN: Providing location privacy for VANET. Tech. rep. Washington Univ Seattle Dept of Electrical Engineering."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/js"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"F. Scheuer K.-P. Fuchs and H. Federrath. 2011. A safety-preserving mix zone for VANETs. In Trust Privacy and Security in Digital Business. Springer Berlin Heidelberg 37--48. doi: 10.1007\/978--3--642--22890--2_4.","DOI":"10.1007\/978--3--642--22890--2_4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.133"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0065"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI50451.2021.9659852"},{"volume-title":"Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, 1--10","author":"Varga A.","key":"e_1_3_2_1_24_1","unstructured":"A. Varga and R. Hornig. 2008. An overview of the OMNeT simulation environment. In Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, 1--10."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-009-0175--4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"}],"event":{"name":"MSWiM '23: Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal Quebec Canada","acronym":"MSWiM '23"},"container-title":["Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3616388.3617520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:02:59Z","timestamp":1730286179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616388.3617520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":26,"alternative-id":["10.1145\/3616388.3617520","10.1145\/3616388"],"URL":"https:\/\/doi.org\/10.1145\/3616388.3617520","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]},"assertion":[{"value":"2023-10-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}