Secure CV2X Using COTS Smartphones over LTE Infrastructure.
Spandan MahadevegowdaRyan M. GerdesThidapat ChantemRose Qingyang HuPublished in: SecureComm (2022)
Keyphrases
- third party
- identity management
- mobile devices
- security services
- software components
- decision support
- pricing model
- security architecture
- quality of service
- daily life
- data collection
- augmented reality
- fold cross validation
- wireless medium
- internet access
- mobile applications
- building blocks
- security requirements
- security mechanisms
- key management
- security issues
- desktop computers
- limited resources
- smart phones
- information exchange