勾引 发表于 2025-3-26 22:44:25

,Das Komplementaritätsprinzip Bohrs, with respect to its efficiency and security protocols. Also, the on-board unit (OBU) technology used may differ among vehicles. An example of such a difference includes the use of varying cryptographic techniques in establishing secure communications among vehicles and infrastructure in VANETs [.].

Leaven 发表于 2025-3-27 03:35:42

Das Kaufmännische Büro aus der Isolationrogeneous vehicular communications in VANETs occur when a vehicle using a security mechanism can transmit a safety message to the surrounding vehicle that uses a different security mechanism or when a vehicle that uses a security mechanism can transmit a safety message to the infrastructure, i.e., a

Hemiparesis 发表于 2025-3-27 07:21:01

http://reply.papertrans.cn/31/3031/303015/303015_33.png

thrombosis 发表于 2025-3-27 09:55:04

http://reply.papertrans.cn/31/3031/303015/303015_34.png

滑稽 发表于 2025-3-27 16:24:41

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

爱管闲事 发表于 2025-3-27 21:05:10

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks978-981-16-8586-6

preeclampsia 发表于 2025-3-28 01:52:34

http://reply.papertrans.cn/31/3031/303015/303015_37.png

圆柱 发表于 2025-3-28 06:02:39

Introduction,s of intelligent transportation systems (ITS) such as vehicular ad hoc networks (VANETs) in smart cities. In recent times, VANETs have received significant attention from academia, industries, and governments due to their importance in traffic management. According to an estimate, the market for veh

无能力 发表于 2025-3-28 09:53:52

Preliminaries,blic key infrastructure (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC)) with respect to digital signature. We then briefly discuss signcryption, the necessary security requirements/services for VANETs, mathematical background, computational assumptions, random oracl

大笑 发表于 2025-3-28 13:53:32

Authentication Scheme for Vehicle-to-Infrastructure Communications using Bilinear Pairing,re some threats to security and privacy due to the open wireless environment and the high speed of vehicles in VANETs. A typical attack consists of a malicious third party modifying and retransmitting intercepted messages. Generally, VANETs make use of the PKI-based signature schemes to authenticate
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks; Ikram Ali,Yong Chen,Meng Li Book 2022 The Editor(s) (if applicable) a