B Zeddini, M Maachaoui, Y Inedjaren - Risks, 2022 - mdpi.com
… Then, we identify security purposes and requirements, and we classify threats in ITSs. … The asymmetric cryptography technique is used to combine the digital signatures. Each mobile …
… (PKI)-based asymmetric cryptography only exclude outsider … security in cITS as a primary focus; the unique requirements … direct threat to the integrity of the data exchanged in the network…
… Of course, authentication mechanisms introduce risks for the … cryptography, asymmetric cryptography, identity-based … the wireless communication standards defined by the Car2Car …
… enforcement of appropriate securityrequirements is needed … -key cryptography and a registration list (RL) to secure VANET. … detection in cooperativeintelligenttransportationsystems,’’ …
… and itsopportunities, challenges, related cryptography funda… an extremely high level of security, information protection, … In this section, the Bitcoin standard, consensus protocols, …
… IEEE 1609.2 standard defines secure beacons format for DSRC. IEEE 1609.2 determines … The asymmetric cryptography can be used in group signature. The group members have their …
… the securityrequirements for future ITS. Finally, we provide some opportunities and possible research areas within the ITS … stresses cryptography's better security and anonymity for ITS …
D Chhikara, S Rana, G Singh… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… secure against known securitythreats, which we proved formally. In addition, the performance analysis … Furthermore, with the advancement of technologies and ITSrequirements, a real-…
… the key ITS enabling standards of smart cities, securitythreats and … the ITSstandards, we perform experiments using a cryptography API … of different cryptography procedures. The ETSI …