找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks; Ikram Ali,Yong Chen,Meng Li Book 2022 The Editor(s) (if applicable) a

[复制链接]
楼主: deteriorate
发表于 2025-3-26 22:44:25 | 显示全部楼层
,Das Komplementaritätsprinzip Bohrs, with respect to its efficiency and security protocols. Also, the on-board unit (OBU) technology used may differ among vehicles. An example of such a difference includes the use of varying cryptographic techniques in establishing secure communications among vehicles and infrastructure in VANETs [.].
发表于 2025-3-27 03:35:42 | 显示全部楼层
Das Kaufmännische Büro aus der Isolationrogeneous vehicular communications in VANETs occur when a vehicle using a security mechanism can transmit a safety message to the surrounding vehicle that uses a different security mechanism or when a vehicle that uses a security mechanism can transmit a safety message to the infrastructure, i.e., a
发表于 2025-3-27 07:21:01 | 显示全部楼层
发表于 2025-3-27 09:55:04 | 显示全部楼层
发表于 2025-3-27 16:24:41 | 显示全部楼层
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
发表于 2025-3-27 21:05:10 | 显示全部楼层
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks978-981-16-8586-6
发表于 2025-3-28 01:52:34 | 显示全部楼层
发表于 2025-3-28 06:02:39 | 显示全部楼层
Introduction,s of intelligent transportation systems (ITS) such as vehicular ad hoc networks (VANETs) in smart cities. In recent times, VANETs have received significant attention from academia, industries, and governments due to their importance in traffic management. According to an estimate, the market for veh
发表于 2025-3-28 09:53:52 | 显示全部楼层
Preliminaries,blic key infrastructure (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC)) with respect to digital signature. We then briefly discuss signcryption, the necessary security requirements/services for VANETs, mathematical background, computational assumptions, random oracl
发表于 2025-3-28 13:53:32 | 显示全部楼层
Authentication Scheme for Vehicle-to-Infrastructure Communications using Bilinear Pairing,re some threats to security and privacy due to the open wireless environment and the high speed of vehicles in VANETs. A typical attack consists of a malicious third party modifying and retransmitting intercepted messages. Generally, VANETs make use of the PKI-based signature schemes to authenticate
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-8 22:15
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表