Unified security architecture and protocols using third party identity in V2V and V2I networks

Title
Unified security architecture and protocols using third party identity in V2V and V2I networks
Authors
Keywords
-
Journal
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Volume 12, Issue 15, Pages 1326-1337
Publisher
Wiley
Online
2010-11-11
DOI
10.1002/wcm.1057

Ask authors/readers for more resources

Add your recorded webinar

Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.

Upload Now

Become a Peeref-certified reviewer

The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.

Get Started