Pseudonym schemes in vehicular networks: A survey

J Petit, F Schaub, M Feiri, F Kargl - … communications surveys & …, 2014 - ieeexplore.ieee.org
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

[PDF][PDF] Pseudonym Schemes in Vehicular Networks: A Survey

J Petit, F Schaub, M Feiri, F Kargl - academia.edu
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

[引用][C] Pseudonym Schemes in Vehicular Networks: A Survey

J Petit, F Schaub, M Feiri, F Kargl - IEEE Communications Surveys …, 2015 - oparu.uni-ulm.de
Pseudonym Schemes in Vehicular Networks: A Survey Toggle navigation English Deutsch
Deutsch English Deutsch Einloggen Toggle navigation Dokumentanzeige Startseite …

Pseudonym Schemes in Vehicular Networks: A Survey

J Petit, F Schaub, M Feiri, F Kargl - IEEE Communications Surveys & …, 2015 - infona.pl
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

[PDF][PDF] Pseudonym Schemes in Vehicular Networks: A Survey

J Petit, F Schaub, M Feiri, F Kargl - researchgate.net
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

Pseudonym schemes in vehicular networks: A survey

J Petit, F Schaub, M Feiri, F Kargl - … communications surveys & …, 2015 - research.utwente.nl
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

[PDF][PDF] Pseudonym Schemes in Vehicular Networks: A Survey

J Petit, F Schaub, M Feiri, F Kargl - ris.utwente.nl
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …

Pseudonym Schemes in Vehicular Networks: A Survey

J Petit, F Schaub, M Feiri, F Kargl - IEEE Communications Surveys & …, 2015 - dl.acm.org
Safety-critical applications in cooperative vehicular networks require authentication of nodes
and messages. Yet, privacy of individual vehicles and drivers must be maintained …