Pseudonymous authentication for secure V2I services in cloud-based vehicular networks.
Youngho ParkChul SurKyung Hyune RheePublished in: J. Ambient Intell. Humaniz. Comput. (2016)
Keyphrases
- identity management
- security services
- cloud computing
- vehicular networks
- electronic payment
- authentication mechanism
- public key infrastructure
- authentication protocol
- user authentication
- security analysis
- access control
- security requirements
- security protocols
- security mechanisms
- key management
- web services
- factor authentication
- propagation model
- routing scheme
- computing resources
- public key cryptography
- ad hoc networks
- data management
- computational complexity