Login / Signup
Group-based authentication in V2V communications.
Hamssa Hasrouny
Carole Bassil
Abed Ellatif Samhat
Anis Laouiti
Published in:
DICTAP (2015)
Keyphrases
</>
user authentication
databases
communication networks
security analysis
real time
data sets
artificial intelligence
web services
security mechanisms
identity authentication
factor authentication