2019 15th International Wireless Communications &Amp; Mobile Computing Conference (IWCMC) 2019
DOI: 10.1109/iwcmc.2019.8766783
|View full text |Cite
|
Sign up to set email alerts
|

An Evaluative Review of the Formal Verification for VANET Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 34 publications
0
1
0
Order By: Relevance
“…Braille transformation, traditionally used to enable blind individuals to read and write, provides a unique opportunity to add a layer of encryption to passwords. By integrating this transformation method before generating the hash, we aim to enhance resistance against brute force, statistical, and differential attacks [11][12][13][14][15][16][17][18][19][20]. Our rigorous methodology involves first decomposing the password into blocks representing each character.…”
Section: Introductionmentioning
confidence: 99%
“…Braille transformation, traditionally used to enable blind individuals to read and write, provides a unique opportunity to add a layer of encryption to passwords. By integrating this transformation method before generating the hash, we aim to enhance resistance against brute force, statistical, and differential attacks [11][12][13][14][15][16][17][18][19][20]. Our rigorous methodology involves first decomposing the password into blocks representing each character.…”
Section: Introductionmentioning
confidence: 99%
“…The general types of VANETs are Vehicle-to-Vehicle (V2V) and Vehicle-to Infrastructure (V2I) communication. Later on, Vehicle to-Roadside units (V2R) are included with it [1]. Most researchers introduced routing protocols to improve the security and traffic model in the VANETs.…”
Section: Introductionmentioning
confidence: 99%