2021
DOI: 10.1007/978-981-33-6835-4_39
|View full text |Cite
|
Sign up to set email alerts
|

Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

4
4

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…The integration of the IoT and cloud computing offers numerous advantages for a wide range of IoT applications. However, given to the rising number of IoT delopements with varying platforms, the development of new IoT applications is a difficult task [3], [4]. This is because massive amounts of data are produced by IoT apps due to the use of sensors and other IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…The integration of the IoT and cloud computing offers numerous advantages for a wide range of IoT applications. However, given to the rising number of IoT delopements with varying platforms, the development of new IoT applications is a difficult task [3], [4]. This is because massive amounts of data are produced by IoT apps due to the use of sensors and other IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…With their rapid and creative designs that guarantee last-mile delivery while being ecologically friendly, UAVs have emerged as viable solutions in this field. UAVs have many advantages, including quick and simple deployment, scalability and flexibility, self-organization, cost-effectiveness, and great maneuverability [19]- [22]. To carry a variety of payloads, such as communication devices, navigational aids, sensors, and cameras, UAVs come in a wide range of configurations, sizes, weights, ranges, and performance traits.…”
Section: Introductionmentioning
confidence: 99%
“…A botnet is a group of compromised computers that the attackers covertly control and utilise for a variety of harmful purposes [21][22][23][24]. A bot master, who controls a botnet's command and control for remote process execution, is the attacker.…”
Section: Introductionmentioning
confidence: 99%