Flinch 发表于 2025-3-23 11:58:35

http://reply.papertrans.cn/31/3031/303015/303015_11.png

enumaerate 发表于 2025-3-23 17:19:17

http://reply.papertrans.cn/31/3031/303015/303015_12.png

放大 发表于 2025-3-23 19:38:26

http://reply.papertrans.cn/31/3031/303015/303015_13.png

Repatriate 发表于 2025-3-24 00:58:31

http://reply.papertrans.cn/31/3031/303015/303015_14.png

新手 发表于 2025-3-24 03:35:25

http://reply.papertrans.cn/31/3031/303015/303015_15.png

TOXIC 发表于 2025-3-24 06:38:19

http://reply.papertrans.cn/31/3031/303015/303015_16.png

inspiration 发表于 2025-3-24 13:08:10

Das Kaufmännische Büro aus der Isolationthat uses a different security mechanism or when a vehicle that uses a security mechanism can transmit a safety message to the infrastructure, i.e., a road-side unit (RSU) that uses a different security mechanism for the verification of the corresponding message [., .].

椭圆 发表于 2025-3-24 16:19:08

http://reply.papertrans.cn/31/3031/303015/303015_18.png

叙述 发表于 2025-3-24 19:16:13

Introduction,considered to be vehicular sensor networks (VSNs) because they allow traffic-related information to be collected by road sensors [.]. In urban areas, the number of vehicles (cars, buses, trucks, etc.) is increasing on a daily bases. This results in an increase in traffic jams and accidents.

ADORN 发表于 2025-3-25 01:14:57

An ECC-Based Conditional Privacy-Preserving Authentication Scheme for Vehicle-to-Vehicle Communicatns, and scalar multiplications in group .) in message signing and signature verification phases. In addition, the scheme [.] presented in the previous chapter also contains one bilinear pairing operation in signature verification.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks; Ikram Ali,Yong Chen,Meng Li Book 2022 The Editor(s) (if applicable) a