Cited By
View all- Sheik ALiu JDianati MMaple C(2025)Comparative evaluation of pseudonym-based anonymisation techniques for connected autonomous vehicles (CAVs)Frontiers in Future Transportation10.3389/ffutr.2025.15197596Online publication date: 25-Feb-2025
- Bussa SSisto RValenza F(2025)Formal verification of a V2X scheme mixing traditional PKI and group signaturesJournal of Information Security and Applications10.1016/j.jisa.2025.10399889(103998)Online publication date: Mar-2025
- Xia YLiu XWu HLi QXia YLiu XWu HLi Q(2025)Traffic Data Access Control in VANETsSecure Data Sensing, Computing, and Dissemination in Vehicular Ad Hoc Networks10.1007/978-981-96-0336-7_5(153-195)Online publication date: 20-Feb-2025
- Show More Cited By