Intractable 发表于 2025-4-1 05:40:42

Autonomous Certification with List-Based Revocation for Secure V2V CommunicationKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the infrastructure presence to communicate with the CA ma

conceal 发表于 2025-4-1 08:08:06

http://reply.papertrans.cn/47/4656/465541/465541_62.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Information Systems Security; 8th International Co Venkat Venkatakrishnan,Diganta Goswami Conference proceedings 2012 Springer-Verlag Berli