Sign in

Unified security architecture and protocols using third party identity in V2V and V2I networks.

Jaeduck ChoiSouhwan Jung
Published in: Wirel. Commun. Mob. Comput. (2012)
Keyphrases