2018 4th International Conference on Recent Advances in Information Technology (RAIT) 2018
DOI: 10.1109/rait.2018.8389051
|View full text |Cite
|
Sign up to set email alerts
|

Re-encrypting secure and efficient routing in VANET groups using sharable clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…BAN Logic [18][19][20][21][22] is a formal logic used for the verification of security protocols. It stands for "Believes, Assumes, and Knows" logic and widely used in the field of computer security to analyze and verify security protocols, such as authentication protocols, key exchange protocols, and secure communication protocols.…”
Section: Security Verification By Using Ban Logicmentioning
confidence: 99%
“…BAN Logic [18][19][20][21][22] is a formal logic used for the verification of security protocols. It stands for "Believes, Assumes, and Knows" logic and widely used in the field of computer security to analyze and verify security protocols, such as authentication protocols, key exchange protocols, and secure communication protocols.…”
Section: Security Verification By Using Ban Logicmentioning
confidence: 99%
“…MM is responsible for registering and revoking any member, and TM is responsible for finding the whereabouts and identity of a guilty vehicle [23]. Cloud is used to fasten the communication, but revealing identity to cloud is also prohibited because of security reasons [24]. Hence, one time credentials have been used to communicate instead of vehicle's personal IDs.…”
Section: Proposed Sapsc Algorithmmentioning
confidence: 99%