Keyphrases
Attack Location
33%
Attack Strategy
33%
Authentication Mechanism
33%
Authentication Scheme
100%
Challenging Tasks
33%
Comprehensive Performance Evaluation
33%
Computational Cost
33%
Connected Autonomous Vehicles
100%
Data Authentication
33%
Exchange Processes
33%
Group Authentication
66%
Group Members
33%
Handover Management
33%
High Mobility
33%
Internet of Vehicles
100%
Location Spoofing
33%
Mobility Rate
33%
Multiple Users
33%
Privacy-preserving Authentication
100%
Promising Solutions
33%
Protecting Privacy
33%
Replay Attack
66%
Security Issues
33%
Spoofing Attack
33%
User Data
33%
Vehicle Environment
66%
Computer Science
Authentication
33%
Authentication Group
66%
Authentication Process
33%
authentication scheme
100%
Autonomous Vehicles
100%
Computational Cost
33%
Data Authentication
33%
Exchanging Data
33%
Group Members
33%
Handover Process
33%
Internet of Vehicles
100%
Privacy Preserving
100%
Protecting Privacy
33%
Security Challenge
33%
Spoofing Attack
33%
User Data
33%