Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography.
Shimaa A. Abdel HakeemMohamed A. Abd El-GawadHyungWon KimPublished in: Sensors (2020)
Keyphrases
- security protocols
- cryptographic algorithms
- automated design
- security services
- hash functions
- artificial immune algorithm
- cellular automata
- authentication protocol
- security mechanisms
- key management
- security requirements
- rfid systems
- high dimensional
- public key cryptography
- real time
- information systems
- search engine