Sign in

Group-based authentication in V2V communications.

Hamssa HasrounyCarole BassilAbed Ellatif SamhatAnis Laouiti
Published in: DICTAP (2015)
Keyphrases
  • user authentication
  • databases
  • communication networks
  • security analysis
  • real time
  • data sets
  • artificial intelligence
  • web services
  • security mechanisms
  • identity authentication
  • factor authentication