2012
DOI: 10.1016/j.proeng.2012.06.023
|View full text |Cite
|
Sign up to set email alerts
|

Identity Based Secure Algorithm for VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…However, these mechanisms fell short since they required a vast amount of storage space for anonymous keys and safety message anonymous authentication. Recently, Horng et al [15] provided a software‐based solution to reduce verification time and alleviate the computational workload of IUs, whereas Chaudhuri et al [16] proposed identity protocols for vehicular networks based on the production of unique identifiers for vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…However, these mechanisms fell short since they required a vast amount of storage space for anonymous keys and safety message anonymous authentication. Recently, Horng et al [15] provided a software‐based solution to reduce verification time and alleviate the computational workload of IUs, whereas Chaudhuri et al [16] proposed identity protocols for vehicular networks based on the production of unique identifiers for vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…(2013) provided a software-based solution to reduce verification time and alleviate the computational workload of IUs, whereas Chaudhuri et al (2012) proposed identity protocols for vehicular ad hoc networks based on the production of unique identifiers for vehicles.…”
Section: Data Privacy and Security Issuesmentioning
confidence: 99%