Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference49 articles.
1. Abbasinezhad-Mood D, Nikooghadam M (2018) Efficient anonymous password-authenticated key exchange protocol to read isolated smart meters by utilization of extended chebyshev chaotic maps. IEEE Trans Ind Inform 14(11):4815–4828
2. Adalier M, Teknik A (2015) Efficient and secure elliptic curve cryptography implementation of curve p-256. In Workshop on elliptic curve cryptography standards 66:2014–2017
3. Al-Sultan S, Al-Doori MM, Al-Bayatti AH, Zedan H (2014) A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl 37:380–392
4. Ali I, Hassan A, Li F (2019) Authentication and privacy schemes for vehicular ad hoc networks (vanets): a survey. Vehicular Commun 16:45–61
5. Azam F, Yadav SK, Priyadarshi N, Padmanaban S, Bansal RC (2021) A comprehensive review of authentication schemes in vehicular ad-hoc network. IEEE Access 9:31309–31321
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献