Login / Signup
Autonomous Certification with List-Based Revocation for Secure V2V Communication.
Anup Kumar Bhattacharya
Abhijit Das
Dipanwita Roy Chowdhury
Aravind Iyer
Debojyoti Bhattacharya
Published in:
ICISS (2012)
Keyphrases
</>
key management
key distribution
multi party
resource constrained
secure communication
third party
trusted third party
security issues
spatially distributed
cooperative
communication systems
robotic systems
security requirements
public key cryptography
decentralized control
communication networks
computer networks