1. E. Agrawal, and P. Pal, Int. J. Eng. Sci, 11481, (2017).
2. F. Garcia, D. Kasper, and P. Pavlid`es, In 25th {USENIX} Security Symposium ({USENIX} Security 16), (2016).
3. H. Kader, and M. Hadhoud, Performance Evaluation, 58–64 (2009).
4. S. Ajinkya, M. Karnik, and Manandeep, On vehicular security for rke and cryptographic algorithms: A survey. may.
5. M. Malhotra and A. Singh, International Journal of Scientific Engineering and Research 1, 77–88, (2013).