NI Shuhaimi, T Juhana - 2012 7th International Conference on …, 2012 - ieeexplore.ieee.org
… vehicularadhocnetworks or VANET. The optimal goal of this study is that vehicularnetworks … of security is required in order to make the VANET deployment possible in near future. In …
… cryptography mechanism. This paper has done comparative analysis of diverse cryptography schemes and their effectiveness for VANET. … In this paper the game theoretic approaches …
D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
… Traditional approaches for secure and authenticated message dissemination, largely based on message encryption and … These approaches cannot be directly applied in the context of …
… vehicularadhocnetworks (VANETs) broadcasts beacons about their traffic status wirelessly for improving traffic safety and efficiency. Before deployment of the VANET … approaches as …
MS Sheikh, J Liang, W Wang - Wireless Communications and …, 2020 - Wiley Online Library
… Several methods have been proposed for discussing the … the vehicularadhocnetworks (VANETs) and vehicular cloud … the VANETs, followed by the comparison of the cryptography and …
L Zhang - IEEE Transactions on Information Forensics and …, 2017 - ieeexplore.ieee.org
… This paper proposes a novel method based on a new security tool referred to as one-time identity-based authenticated asymmetric group key agreement to create CMIXes which …
MS Al-Kahtani - 2012 6th international conference on signal …, 2012 - ieeexplore.ieee.org
… security attributes in VehicularAdhocNetworks (VANETs) and types of malicious vehicles. … PVN can cooperate with various types cryptographymethods and defend against more …
M Azees, P Vijayakumar… - IET Intelligent Transport …, 2016 - Wiley Online Library
… This approach utilised ID-based cryptography for generating secret keys for pseudo-IDs and thus it avoids the use of certificates. Hence, the transmission overhead can also be reduced …
… the keys to do the cryptographic operations. Only the particular … Public key cryptography, unlike private key cryptography, does … but it is much slower than the private key cryptography. …