-
1“...The sensitive information of vehicles is related to location in vehicular networks. Pseudonym...”
Get full text
Article -
2“... for VANETs. The scheme is equipped with pseudonyms, identity-based cryptographic mechanisms, and several...”
Get full text
Article -
3“... of access authentication. Multiple pseudonyms are presented to preserve the privacy of vehicle node. Besides...”
Get full text
Article