Sign in

An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation.

Ruhul AminParas LohaniMcLican EkkaSunay ChourasiaSatyanarayana Vollala
Published in: Comput. Electr. Eng. (2020)
Keyphrases
  • security protocols
  • vehicular ad hoc networks
  • security properties
  • authentication protocol
  • artificial immune algorithm
  • database systems
  • security services
  • real time
  • intrusion detection