Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference49 articles.
1. Adalier, M., & Teknik, A. (2015). Efficient and secure elliptic curve cryptography implementation of curve p-256. In Workshop on elliptic curve cryptography standards, (Vol. 66, pp. 2014–2017).
2. Al-Sultan, S., Al-Doori, M. M., Al-Bayatti, A. H., & Zedan, H. (2014). A comprehensive survey on vehicular ad hoc network. Journal of Network and Computer Applications, 37, 380–392.
3. Ali, I., Hassan, A., & Li, F. (2019). Authentication and privacy schemes for vehicular ad hoc networks (vanets): A survey. Vehicular Communications, 16, 45–61.
4. Azam, F., Yadav, S. K., Priyadarshi, N., Padmanaban, S., & Bansal, R. C. (2021). A comprehensive review of authentication schemes in vehicular ad-hoc network. IEEE Access, 9, 31309–31321.
5. Azees, M., Vijayakumar, P., & Deboarh, L. J. (2017). Eaap: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 18(9), 2467–2476.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献