Sign Up to like & get
recommendations!
1
Published in 2017 at "Soft Computing"
DOI: 10.1007/s00500-016-2440-3
Abstract: The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not…
read more here.
Keywords:
key authentication;
authentication scheme;
authentication;
public key ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Wireless Networks"
DOI: 10.1007/s11276-016-1197-z
Abstract: Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due…
read more here.
Keywords:
key authentication;
vanet;
detection;
group key ... See more keywords