Keyphrases
Authentication Scheme
100%
Connected Autonomous Vehicles
100%
Privacy-preserving Authentication
100%
Internet of Vehicles
100%
Group Authentication
66%
Vehicle Environment
66%
Replay Attack
66%
Multiple Users
33%
Challenging Tasks
33%
Computational Cost
33%
Attack Strategy
33%
Handover Management
33%
High Mobility
33%
Authentication Mechanism
33%
Promising Solutions
33%
User Data
33%
Exchange Processes
33%
Comprehensive Performance Evaluation
33%
Mobility Rate
33%
Spoofing Attack
33%
Protecting Privacy
33%
Data Authentication
33%
Location Spoofing
33%
Group Members
33%
Attack Location
33%
Security Issues
33%
Computer Science
Autonomous Vehicles
100%
authentication scheme
100%
Privacy Preserving
100%
Internet of Vehicles
100%
Authentication Group
66%
Authentication
33%
Handover Process
33%
User Data
33%
Spoofing Attack
33%
Data Authentication
33%
Protecting Privacy
33%
Group Members
33%
Exchanging Data
33%
Security Challenge
33%
Authentication Process
33%
Computational Cost
33%