Author:
Xia Zhe,Shu Yifeng,Shen Hua,Zhang Mingwu
Publisher
Springer International Publishing
Reference27 articles.
1. Bayat, M., Barmshoory, M., Rahimi, M.: A secure authentication scheme for VANETs with batch verification. Wireless Netw. 21(5), 1733–1743 (2015)
2. Bo, X.-L.: Analysis of the security mechanism of internet of vehicles communication based on public key cryptography. Internet Things Technol. 5(8), 32–34 (2018)
3. Lecture Notes in Computer Science;E Bresson,2003
4. Cao, B., Sun, Z.-H., Zhang, J.-T.: Resource allocation in 5G IoV architecture based on SDN and fog-cloud computing. IEEE Trans. Intell. Transp. Syst. 22, 1–9 (2021)
5. Lecture Notes in Computer Science;F Hao,2009
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献