Login / Signup
Reconstruction of a Secure Authentication Scheme for Vehicular Ad Hoc Networks Using a Binary Authentication Tree.
Kyung-Ah Shim
Published in:
IEEE Trans. Wirel. Commun. (2013)
Keyphrases
</>
authentication scheme
vehicular ad hoc networks
user authentication
smart card
authentication protocol
secret key
image authentication
elliptic curve cryptography
security flaws
security analysis
public key
data dissemination
index structure
end to end
diffie hellman
key management
key agreement