Author:
Sulthana Shazia,Reddy B. N. Manjunatha
Publisher
Springer Nature Singapore
Reference16 articles.
1. Vijayakumar P, Azees M, Kannan A, Deborah LJ (2015) Dual authentication and key management techniques for secure data transmission in vehicular ad hoc network. IEEE Trans Intell Transp Syst, pp 1524–9050
2. Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63
3. Wasef A, Jiang YShen X (2008) ECMV: Efficient certificate management scheme for vehicular networks. In: Proceedings of IEEE GLOBECOM, New Orleans, LA, USA, pp 1–5
4. Shen W, Liu L, Cao X (2013) Cooperative message authentication in vehicular cyber-physical systems. IEEE Trans Emerg Top Comput 1(1):84–97
5. Syamsuddin I, Dillon T, Chang E, Han S (2008) A survey of RFID authentication protocols based on hash method. In: Proceedings of 3rd ICCIT, vol 2, pp 559–564