Ensuring privacy and authentication for V2V resource sharing.
Leila BenarousBenamar KadriPublished in: EST (2017)
Keyphrases
- resource sharing
- identity management
- cloud computing
- authentication protocol
- load balancing
- grid systems
- information sharing
- electronic payment
- grid computing
- peer to peer
- resource allocation
- distributed computing
- security issues
- network resources
- virtual organization
- computing resources
- data center
- smart card
- data mining
- database
- computer systems
- real time