Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security.
Anna AngelogianniIoannis KrontirisThanassis GiannetsosPublished in: VNC (2023)
Keyphrases
- comparative evaluation
- security mechanisms
- security policies
- public key infrastructure
- resource constrained
- information exchange
- communication protocols
- access control
- security issues
- trusted computing
- rfid systems
- security problems
- security requirements
- public key
- digital copyright protection
- security model
- security services
- intrusion detection
- operating system
- information security
- resource constraints
- scoring methods
- information sharing
- computer security
- computer networks
- security analysis
- secure communication
- distributed systems
- public key cryptography
- digital signature
- network security
- computer systems
- communication systems
- rfid tags
- sensor networks
- bilinear pairings
- computer science