Secure Authentication Scheme for 5G-based V2X Communications.
Meriem HoumerMariyam OuaissaMariya OuaissaPublished in: EUSPN/ICTH (2021)
Keyphrases
- authentication scheme
- smart card
- user authentication
- secret key
- elliptic curve cryptography
- image encryption
- public key
- authentication protocol
- key management
- security analysis
- security flaws
- mutual authentication
- image authentication
- real time
- group communication
- key distribution
- key agreement
- operating system
- lightweight