Login / Signup
Unified security architecture and protocols using third party identity in V2V and V2I networks.
Jaeduck Choi
Souhwan Jung
Published in:
Wirel. Commun. Mob. Comput. (2012)
Keyphrases
</>
third party
security architecture
trusted third party
sensitive information
personal information
security model
access control
security policies
security mechanisms
personal data
private information
simulation platform
database
sensitive data
data integrity
data protection
database management systems